nextgenhealthcare / connect

The swiss army knife of healthcare integration.
Other
929 stars 280 forks source link

[SECURITY] Possible 0-Day Path Traversal Vulnerability in Mirth Connect Administrator #6210

Open ifconfig-me opened 5 months ago

ifconfig-me commented 5 months ago

Describe the security issue A path traversal vulnerability exists in Mirth Connect Administrator that allows an attacker to access arbitrary files on the server. By manipulating the URL, specifically using a sequence of specially crafted semi-encoded payloads attacker can access to sensitive files outside the web root directory.

Vulnerability Location This vulnerability is in the Mirth Connect codebase itself.

Environment (please complete the following information if it is applicable to the issue)

Suggested remediation Sanitize and validate all input URLs to prevent path traversal sequences. Ensure that the URL paths are resolved within the intended directory structure. Additionally, implementing a security mechanism to disallow URL-encoded traversal characters can mitigate this issue.

Additional context This vulnerability was discovered during a routine security audit. Exploiting this path traversal vulnerability can lead to unauthorized access to sensitive files on the server, potentially exposing critical system and user data.

pacmano1 commented 5 months ago

What do you mean?

There is:

Are you saying the Mirth Connect Server Process has this problem?
What version of Mirth?

Also, is your tool finding: https://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html? An already known and patched CVE in mirth 4.5?

If this is some other finding, I am sure the Nextgen team would like to know the specifics (I don't work for Nextgen) and would appreciate you directly reaching out to them.

sg-prc commented 5 months ago

@ifconfig-me Do you need to be authenticated to Mirth Connect Administrator for this vuln to be triggered?