Authenticated SQL Injection in OpenEMR before 5.0.2.1

Overview :
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
Affected Product(s) :
  • OpenEMR 5.0.1
  • OpenEMR 5.0.1.1
  • OpenEMR 5.0.1.2
  • OpenEMR 5.0.1.3
  • OpenEMR 5.0.1.4
  • OpenEMR 5.0.1.5
  • OpenEMR 5.0.1.6
  • OpenEMR 5.0.1.7
  • OpenEMR 5.0.2
Vulnerability Details :
CVE ID : CVE-2019-16404
If the OpenEMR instance was running on localhost port 80, the following URL could be used to exploit the vulnerability, executing the payload “version()”.

http://localhost/openemr/interface/forms/eye/js/eye_base.php?providerID=1%27,%274%27,%27title%27

Note that this would require there to be no existing providerID 1 present in the database. After retrieving the cell of data, the next cell retrieved would have to use a new provider id, since this also has the affect of adding data with the provderID.

Solution :

Fixed-In Version: 5.0.2.1

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-44400 : ORETNOM23 PURCHASE ORDER MANAGEMENT SYSTEM 1.0 UNRESTRICTED UPLOAD

CVE-2022-44400 : ORETNOM23 PURCHASE ORDER MANAGEMENT SYSTEM 1.0 UNRESTRICTED UPLOAD

Description Purchase Order Management System v1.0 contains a file upload vulnerability via /purchase_order/admin/?page=system_info. References https://github.com/lcg-22266/bug_report/blob/main/vendors/oretnom23/Purchase%20Order%20Management%20System/UPLOAD-1.md For More Information MITRE

CVE-2022-45919 : LINUX KERNEL UP TO 6.0.10/0221.C DVB_CA_EN50221.C DVB_CA_EN50221_IO_RELEASE USE AFTER FREE

CVE-2022-45919 : LINUX KERNEL UP TO 6.0.10/0221.C DVB_CA_EN50221.C DVB_CA_EN50221_IO_RELEASE USE AFTER FREE

Description An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is

CVE-2022-41157 : KYUNGRINARA ERP SOLUTION SERP SERVER HARD-CODED CREDENTIALS

CVE-2022-41157 : KYUNGRINARA ERP SOLUTION SERP SERVER HARD-CODED CREDENTIALS

Description A specific file on the sERP server if Kyungrinara(ERP solution) has a fixed password with the SYSTEM authority. This