In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameter payment_id in interface\billing\new_payment.php via interface\billing\payment_master.inc.php leads to SQL injection.
References
Link | Resource |
---|---|
https://gitlab.com/librehealth/ehr/lh-ehr/-/tags | Third Party Advisory |
https://github.com/LibreHealthIO/lh-ehr/tags | Third Party Advisory |
https://nitroteam.kz/index.php?action=researches&slug=librehealth_r | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-05-05 05:15
Updated : 2022-05-12 12:54
NVD link : CVE-2022-29938
Mitre link : CVE-2022-29938
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
librehealth
- librehealth_ehr