First published: Fri Dec 17 2021(Updated: )
An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =6.0.0 | |
Open-emr Openemr | =6.0.0-patch_1 | |
Open-emr Openemr | =6.0.0-patch_2 | |
=6.0.0 | ||
=6.0.0-patch_1 | ||
=6.0.0-patch_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41843 is an authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3.
CVE-2021-41843 allows an attacker to read data from all tables of the database by exploiting the calendar search function with the parameter provider_id.
The severity of CVE-2021-41843 is medium with a CVSS score of 6.5.
To fix CVE-2021-41843, you should update OpenEMR to patch version 6.0.0-patch_3 or later.
You can find more information about CVE-2021-41843 on the following references: [Link 1](http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html), [Link 2](http://seclists.org/fulldisclosure/2021/Dec/38), [Link 3](https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt).