First published: Sat May 14 2022(Updated: )
OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). Versions prior to 3.16.1 are vulnerable to SQL injection due to the use of string concatenation to create SQL queries instead of prepared statements. No known workarounds exist. This issue has been patched in 3.16.1, 3.15.9, 3.14.1, and 3.13.1 and users are advised to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenClinica | <3.13.1 | |
OpenClinica | >3.15<3.15.9 | |
OpenClinica | >3.16<3.16.1 | |
OpenClinica | =3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24831 has a high severity rating due to its potential for SQL injection attacks.
To fix CVE-2022-24831, upgrade OpenClinica to version 3.16.1 or later.
CVE-2022-24831 affects OpenClinica versions prior to 3.16.1, including 3.14, 3.15.x, and 3.13.1.
CVE-2022-24831 is an SQL injection vulnerability caused by the use of string concatenation in SQL queries.
Yes, CVE-2022-24831 can potentially be exploited remotely by attackers to execute arbitrary SQL commands.