First published: Fri May 07 2021(Updated: )
A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =5.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32104 is a SQL injection vulnerability in OpenEMR 5.0.2.1.
CVE-2021-32104 has a severity rating of 8.8 (high).
This vulnerability can be exploited by an attacker with user privileges by injecting malicious SQL queries through the save.php file in OpenEMR 5.0.2.1.
To fix CVE-2021-32104, it is recommended to apply the patches provided by OpenEMR and upgrade to the latest version.
You can find more information about CVE-2021-32104 on the following references: https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability, https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431, https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592.