SQL Injection Vulnerability in Care2x Open Source Hospital Information Management 2.7 Alpha via the (1) pday, (2) pmonth, and (3) pyear parameters in GET requests sent to /modules/nursing/nursing-station.php.
References
Link | Resource |
---|---|
https://securityforeveryone.com/blog/care2x-hospital-information-management-system-0-day-vulnerability-cve-2021-36351 | Third Party Advisory |
https://www.exploit-db.com/exploits/50165 | Exploit Third Party Advisory VDB Entry |
https://securityforeveryone.com/blog/care2x-hospital-information-management-system-0-day-vulnerability-cve-2021-36351 | Third Party Advisory |
https://www.exploit-db.com/exploits/50165 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://securityforeveryone.com/blog/care2x-hospital-information-management-system-0-day-vulnerability-cve-2021-36351 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/50165 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2021-08-06 14:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36351
Mitre link : CVE-2021-36351
CVE.ORG link : CVE-2021-36351
JSON object : View
Products Affected
care2x
- hospital_information_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')