A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell.
References
Link | Resource |
---|---|
https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ | Third Party Advisory |
https://www.blacklanternsecurity.com/blog/ | Third Party Advisory |
https://www.cerner.com/solutions/mobility | Product Vendor Advisory |
https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ | Third Party Advisory |
https://www.blacklanternsecurity.com/blog/ | Third Party Advisory |
https://www.cerner.com/solutions/mobility | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ - Third Party Advisory | |
References | () https://www.blacklanternsecurity.com/blog/ - Third Party Advisory | |
References | () https://www.cerner.com/solutions/mobility - Product, Vendor Advisory |
Information
Published : 2021-08-24 12:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36385
Mitre link : CVE-2021-36385
CVE.ORG link : CVE-2021-36385
JSON object : View
Products Affected
cerner
- mobile_care
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')