A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter.
References
Link | Resource |
---|---|
https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 | Release Notes Vendor Advisory |
https://murat.one/?p=70 | Exploit Third Party Advisory |
https://nitroteam.kz/index.php?action=researches&slug=OpenEMR--9035 | Exploit Third Party Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Downloads | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-15T20:22:07
Updated: 2021-02-15T20:22:07
Reserved: 2020-11-27T00:00:00
Link: CVE-2020-29139
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-15T21:15:12.907
Modified: 2021-02-22T18:01:46.267
Link: CVE-2020-29139
JSON object: View
Redhat Information
No data.
CWE