First published: Tue Apr 13 2021(Updated: )
An exploitable unatuhenticated command injection exists in the OpenClinic GA 5.173.3. Specially crafted web requests can cause commands to be executed on the server. An attacker can send a web request with parameters containing specific parameter to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and compromise underlying operating system.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openclinic Ga Project Openclinic Ga | =5.173.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27227 is an unauthenticated command injection vulnerability in OpenClinic GA 5.173.3.
CVE-2020-27227 has a severity rating of 9.8 (Critical).
CVE-2020-27227 allows an attacker to execute commands on the server by sending specially-crafted web requests with specific parameters.
The impacted software version for CVE-2020-27227 is OpenClinic GA 5.173.3.
Yes, a fix for CVE-2020-27227 is available. It is recommended to update to a version that has addressed this vulnerability.