CVE-2020-27229

A number of exploitable SQL injection vulnerabilities exists in ‘patientslist.do’ page of OpenClinic GA 5.173.3 application. The findPersonID parameter in ‘‘patientslist.do’ page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 Exploit Technical Description Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.173.3:*:*:*:*:*:*:*

History

21 Nov 2024, 05:20

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 - Exploit, Technical Description, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205 - Exploit, Technical Description, Third Party Advisory

Information

Published : 2021-05-10 19:15

Updated : 2024-11-21 05:20


NVD link : CVE-2020-27229

Mitre link : CVE-2020-27229

CVE.ORG link : CVE-2020-27229


JSON object : View

Products Affected

openclinic_ga_project

  • openclinic_ga
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')