An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Dec/38 | Exploit Mailing List Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2109-01 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-17T03:25:44
Updated: 2021-12-17T18:06:40
Reserved: 2021-10-01T00:00:00
Link: CVE-2021-41843
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-17T04:15:38.810
Modified: 2021-12-22T20:20:59.740
Link: CVE-2021-41843
JSON object: View
Redhat Information
No data.
CWE