CVE-2017-5598

An issue was discovered in eClinicalWorks healow@work 8.0 build 8. This is a blind SQL injection within the EmployeePortalServlet, which can be exploited by un-authenticated users via an HTTP POST request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects the EmployeePortalServlet page and the following parameter: employer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclinicalworks:patient_portal:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/95836 - () http://www.securityfocus.com/bid/95836 -
References () https://gist.github.com/malerisch/ded4d6e6e980667ee9f7fc7f2818f4fa - Exploit, Third Party Advisory () https://gist.github.com/malerisch/ded4d6e6e980667ee9f7fc7f2818f4fa - Exploit, Third Party Advisory

Information

Published : 2017-01-27 10:59

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5598

Mitre link : CVE-2017-5598

CVE.ORG link : CVE-2017-5598


JSON object : View

Products Affected

eclinicalworks

  • patient_portal
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')