A SQL injection vulnerability in interface/reports/non_reported.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.open-emr.org/wiki/index.php/OpenEMR_Downloads | release notes vendor advisory |
https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 | release notes vendor advisory |
https://nitroteam.kz/index.php?action=researches&slug=OpenEMR--9035 | third party advisory exploit |
https://murat.one/?p=94 | third party advisory exploit |