CVE-2022-4727
Summary
| CVE | CVE-2022-4727 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-12-27 15:15:00 UTC |
| Updated | 2023-11-07 03:58:00 UTC |
| Description | A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openmrs | Appointment Scheduling Module | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2022-4727 | OpenMRS Appointment Scheduling Module Notes AppointmentRequest.java getNotes cross site scripting (ID 39) | MISC | vuldb.com | |
| RA1865 - Fixing reflected XSS in the notes section (#39) · openmrs/openmrs-module-appointmentscheduling@2ccbe39 · GitHub | MISC | github.com | |
| Release 1.17.0 · openmrs/openmrs-module-appointmentscheduling · GitHub | MISC | github.com | |
| RA1865 - Fixing reflected XSS in the notes section by varsha5595 · Pull Request #39 · openmrs/openmrs-module-appointmentscheduling · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.