cve/2020/CVE-2020-27231.md

19 lines
1000 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-27231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27231)
![](https://img.shields.io/static/v1?label=Product&message=OpenClinic%20GA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
A number of exploitable SQL injection vulnerabilities exists in patientslist.do page of OpenClinic GA 5.173.3 application. The findDistrict parameter in patientslist.do page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.