漏洞标题
N/A
漏洞描述信息
在OpenEMR 4.1.2(patch 7)及更早版本中,多个SQL注入漏洞允许远程授权用户通过(1)布局ID参数到界面/super/edit_layout.php;(2)表单用户ID,(3)表单药物名称或(4)表单库存编号参数到界面/reports/prescriptions_report.php;(5)支付ID参数到界面/billing/edit_payment.php;(6)ID参数到界面/forms_admin/forms_admin.php;(7)表单pid或(8)表单 encounters 参数到界面/billing/sl_eob_search.php;(9)排序参数到界面/logview/logview.php;表单设施参数到(10)程序状态.php,(11)待后续处理.php或(12)待订单.php在界面/orders/;(13)患者,(14) encounterid,(15)等待,或(16)问题参数到界面/patient_file/deleter.php;(17)搜索关键词参数到界面/patient_file/encounter/coding_popup.php;(18)文本参数到界面/patient_file/encounter/search_code.php;(19)表单地址1,(20)表单地址2,(21)表单地址,(22)表单国家,(23)表单合作伙伴,(24)表单名称,(25)表单zip,(26)表单州,(27)表单城市,或(28)表单 CMS ID 参数到界面/practice/ins_search.php;(30)表单pid参数到界面/patient_file/problem_encounter.php;(31)患者,(32)表单Provider,(33)表单预约状态,或(34)表单设施参数到界面/reports/appointments_report.php;(35)数据库ID参数到界面/patient_file/summary/demographics_save.php;(36)p参数到界面/fax/fax_dispatch_newpid.php;或(37)患者 ID 参数到界面/patient_file/reminder/patient_reminders.php。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
Multiple SQL injection vulnerabilities in OpenEMR 4.1.2 (Patch 7) and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) layout_id parameter to interface/super/edit_layout.php; (2) form_patient_id, (3) form_drug_name, or (4) form_lot_number parameter to interface/reports/prescriptions_report.php; (5) payment_id parameter to interface/billing/edit_payment.php; (6) id parameter to interface/forms_admin/forms_admin.php; (7) form_pid or (8) form_encounter parameter to interface/billing/sl_eob_search.php; (9) sortby parameter to interface/logview/logview.php; form_facility parameter to (10) procedure_stats.php, (11) pending_followup.php, or (12) pending_orders.php in interface/orders/; (13) patient, (14) encounterid, (15) formid, or (16) issue parameter to interface/patient_file/deleter.php; (17) search_term parameter to interface/patient_file/encounter/coding_popup.php; (18) text parameter to interface/patient_file/encounter/search_code.php; (19) form_addr1, (20) form_addr2, (21) form_attn, (22) form_country, (23) form_freeb_type, (24) form_partner, (25) form_name, (26) form_zip, (27) form_state, (28) form_city, or (29) form_cms_id parameter to interface/practice/ins_search.php; (30) form_pid parameter to interface/patient_file/problem_encounter.php; (31) patient, (32) form_provider, (33) form_apptstatus, or (34) form_facility parameter to interface/reports/appointments_report.php; (35) db_id parameter to interface/patient_file/summary/demographics_save.php; (36) p parameter to interface/fax/fax_dispatch_newpid.php; or (37) patient_id parameter to interface/patient_file/reminder/patient_reminders.php.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
OpenEMR SQL注入漏洞
漏洞描述信息
OpenEMR是OpenEMR社区所维护的一套开源的医疗管理系统。该系统可用于医疗实践管理、电子医疗记录、处方书写和医疗帐单申请。 OpenEMR 4.1.2(Patch 7)及之前版本中存在SQL注入漏洞,该漏洞源于interface/super/edit_layout.php脚本没有充分过滤‘layout_id’参数;interface/reports/prescriptions_report.php脚本没有充分过滤‘form_patient_id’、‘form_drug_name’和‘form_lo
CVSS信息
N/A
漏洞类别
SQL注入