A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings.
References
Link | Resource |
---|---|
https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 | Release Notes Vendor Advisory |
https://murat.one/?p=90 | Exploit Third Party Advisory |
https://nitroteam.kz/index.php?action=researches&slug=OpenEMR--9035 | Exploit Third Party Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Downloads | Release Notes Vendor Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-02-15 20:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-29142
Mitre link : CVE-2020-29142
CVE.ORG link : CVE-2020-29142
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')