Authenticated SQL Injection in OpenEMR before 5.0.2.1

Overview :
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
Affected Product(s) :
  • OpenEMR 5.0.1
  • OpenEMR 5.0.1.1
  • OpenEMR 5.0.1.2
  • OpenEMR 5.0.1.3
  • OpenEMR 5.0.1.4
  • OpenEMR 5.0.1.5
  • OpenEMR 5.0.1.6
  • OpenEMR 5.0.1.7
  • OpenEMR 5.0.2
Vulnerability Details :
CVE ID : CVE-2019-16404
If the OpenEMR instance was running on localhost port 80, the following URL could be used to exploit the vulnerability, executing the payload “version()”.

http://localhost/openemr/interface/forms/eye/js/eye_base.php?providerID=1%27,%274%27,%27title%27

Note that this would require there to be no existing providerID 1 present in the database. After retrieving the cell of data, the next cell retrieved would have to use a new provider id, since this also has the affect of adding data with the provderID.

Solution :

Fixed-In Version: 5.0.2.1

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-48889 : FORTINET FORTIMANAGER UP TO 6.4.14/7.0.12/7.2.7/7.4.4/7.6.0 FGFM REQUEST OS COMMAND INJECTION

CVE-2024-48889 : FORTINET FORTIMANAGER UP TO 6.4.14/7.0.12/7.2.7/7.4.4/7.6.0 FGFM REQUEST OS COMMAND INJECTION

Description An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiManager version

CVE-2023-34990 : FORTINET FORTIWLM UP TO 8.5.4/8.6.5 WEB REQUEST PATH TRAVERSAL

CVE-2023-34990 : FORTINET FORTIWLM UP TO 8.5.4/8.6.5 WEB REQUEST PATH TRAVERSAL

Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute

CVE-2024-47104 : IBM I 7.4/7.5 PHYSICAL FILE SECURITY ATTRIBUTES PERMISSION ASSIGNMENT

CVE-2024-47104 : IBM I 7.4/7.5 PHYSICAL FILE SECURITY ATTRIBUTES PERMISSION ASSIGNMENT

Description IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A