First published: Wed Aug 15 2018(Updated: )
SQL injection vulnerability in interface/de_identification_forms/find_code_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <=5.0.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15151 is considered a critical SQL injection vulnerability due to the potential for remote authenticated attackers to execute arbitrary SQL commands.
To fix CVE-2018-15151, upgrade OpenEMR to version 5.0.1.4 or later where the vulnerability has been patched.
CVE-2018-15151 affects OpenEMR versions prior to 5.0.1.4, specifically versions up to and including 5.0.1.3.
No, CVE-2018-15151 requires remote authenticated access for exploitation.
CVE-2018-15151 enables SQL injection attacks, allowing attackers to manipulate database queries through the 'search_term' parameter.