### [CVE-2020-27242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27242) ![](https://img.shields.io/static/v1?label=Product&message=OpenClinic%20GA&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) ### Description An exploitable SQL injection vulnerability exists in ‘listImmoLabels.jsp’ page of OpenClinic GA 5.173.3 application. The immoLocation parameter in the ‘listImmoLabels.jsp’ page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208 #### Github No PoCs found on GitHub currently.