Skip to content

General OpenMRS Security Advisory, January 2025: Penetration Testing Results and Patches

Critical severity GitHub Reviewed Published Jan 30, 2025 in openmrs/openmrs-core • Updated Jan 31, 2025

Package

maven org.openmrs.module:addresshierarchy (Maven)

Affected versions

< 2.19.0

Patched versions

2.19.0
maven org.openmrs.module:attachments (Maven)
< 3.6.0
3.6.0
maven org.openmrs.module:idgen (Maven)
< 4.14.0
4.14.0
maven org.openmrs.module:legacyui (Maven)
< 1.21.0
1.21.0
maven org.openmrs.module:patientflags (Maven)
< 3.0.8
3.0.8
maven org.openmrs:openmrs (Maven)
< 2.6.11
2.6.11

Description

Impact

We recently underwent Penetration Testing of OpenMRS by a third-party company. Vulnerabilities were found, and fixes have been made and released. We've released security updates that include critical fixes, and so, we strongly recommend upgrading affected modules.

This notice applies to all OpenMRS instances. The testers used the OpenMRS v3 Reference Application (O3 RefApp); however, their findings highlighted modules commonly used in older OpenMRS applications, including the O2 RefApp.

Vulnerability Details

  • The issues uncovered included broken access control (e.g. inappropriate admin access), phishing vulnerability, and stored XSS (e.g. vulnerable passwords).
  • No vulnerabilities were found in the O3 frontend esm modules.
  • The Letter of Attestation from the penetration test is available here for your reference.
  • After the fixes were applied, the OpenMRS O3 RefApp met a Security Level of “Excellent, Grade A”.
  • The full detailed Remediation Pentest Report is available to Implementation Technical Leads upon request.

Patches

Minimum Requirements for Implementers: We strongly recommend upgrading your modules to the following versions (or greater) as soon as possible. This is the minimum amount to do and be protected from the vulnerabilities found and fixed. The following versions contain the patch:

  • Platform 2.6.11+
    • How: Increase your platform version number wherever this is specified in your implementation. If you use the OpenMRS SDK, this will be in the distro.properties file.
    • Notes:
      • The newly released Platform 2.7 also includes the fixes. Release Notes and more download options here.
      • Platform 2.6.8+ has most of the fixes, but these are broken if you don't use SSL, so Platform 2.6.11 or higher is preferred.
      • For those still on Platform 2.5+ such as the Bahmni ecosystem, the new 2.5.14 release includes the patch. Bahmni note: The upcoming patch release for both Bahmni Lite and Bahmni Standard will incorporate these security fixes.
  • Legacy UI OMOD 1.21.0+ (here)
  • ID Gen OMOD 4.14.0+ (here)
  • Address Hierarchy OMOD 2.19.0+ (here)
  • Attachments OMOD 3.6.0+ (here)
  • Patient Flags OMOD 3.0.8+ (here)

Workarounds

There are no practical workarounds to fix or remediate the vulnerabilities without upgrading. Technically, you could remove the affected OMODs, but this would badly degrade the system's functionality.

Thank you to our amazing Security contributors!

Thank you to security firm UnderDefense, and to the OpenMRS Security Group contributors for their patch support - specific thanks to Daniel Kayiwa, Samuel Lubwama, Ian Bacher, Rafal Korytkowski, and Michael Seaton.

References

@gracepotma gracepotma published to openmrs/openmrs-core Jan 30, 2025
Published to the GitHub Advisory Database Jan 30, 2025
Reviewed Jan 30, 2025
Last updated Jan 31, 2025

Severity

Critical

EPSS score

CVE ID

No known CVE

GHSA ID

GHSA-vpxm-cr3r-pjp9

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.