First published: Mon Aug 13 2018(Updated: )
Multiple SQL injection vulnerabilities in portal/find_appt_popup_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) catid or (2) providerid parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <5.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15143 is considered a critical vulnerability due to its potential for remote attackers to execute arbitrary SQL commands.
To fix CVE-2018-15143, upgrade OpenEMR to version 5.0.1.4 or later.
CVE-2018-15143 affects the portal/find_appt_popup_user.php file in versions of OpenEMR prior to 5.0.1.4.
Yes, CVE-2018-15143 can be exploited remotely by an attacker through specific parameters.
The parameters involved in CVE-2018-15143 are catid and providerid.