First published: Mon May 10 2021(Updated: )
A number of exploitable SQL injection vulnerabilities exists in ‘patientslist.do’ page of OpenClinic GA 5.173.3 application. The findDistrict parameter in ‘‘patientslist.do’ page is vulnerable to authenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openclinic Ga Project Openclinic Ga | =5.173.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the SQL injection vulnerability in OpenClinic GA 5.173.3 is CVE-2020-27231.
The SQL injection vulnerability in OpenClinic GA 5.173.3 has a severity score of 8.8 (high).
The 'patientslist.do' page of OpenClinic GA 5.173.3 is vulnerable to SQL injection.
The SQL injection vulnerability affects OpenClinic GA version 5.173.3.
Yes, the SQL injection vulnerability in OpenClinic GA 5.173.3 requires authentication to exploit.