2020-10-19 16:01:45 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2020-27241" ,
2021-04-19 21:00:39 +00:00
"ASSIGNER" : "talos-cna@cisco.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "n/a" ,
"product" : {
"product_data" : [
{
"product_name" : "OpenClinic" ,
"version" : {
"version_data" : [
{
"version_value" : "OpenClinic GA 5.173.3"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
2022-04-28 14:36:12 -04:00
"value" : "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
2021-04-19 21:00:39 +00:00
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207" ,
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207"
}
]
2020-10-19 16:01:45 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-04-19 21:00:39 +00:00
"value" : "An exploitable SQL injection vulnerability exists in \u2018getAssets.jsp\u2019 page of OpenClinic GA 5.173.3. The serialnumber parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
2020-10-19 16:01:45 +00:00
}
]
2022-04-18 17:22:54 -04:00
} ,
"impact" : {
"cvss" : {
"baseScore" : 6.4 ,
"baseSeverity" : "Medium" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" ,
"version" : "3.0"
}
2020-10-19 16:01:45 +00:00
}
}