A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings.
References
Link | Resource |
---|---|
https://murat.one/?p=90 | Exploit Third Party Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch Vendor Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Downloads | Release Notes Vendor Advisory |
https://nitroteam.kz/index.php?action=researches&slug=OpenEMR--9035 | Exploit Third Party Advisory |
https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 | Release Notes Vendor Advisory |
Configurations
Information
Published : 2021-02-15 12:15
Updated : 2021-02-18 09:23
NVD link : CVE-2020-29142
Mitre link : CVE-2020-29142
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
open-emr
- openemr