Vulnerability Details : CVE-2013-4619
Multiple SQL injection vulnerabilities in OpenEMR 4.1.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) start or (2) end parameter to interface/reports/custom_report_range.php, or the (3) form_newid parameter to custom/chart_tracker.php.
Vulnerability category: Sql Injection
Products affected by CVE-2013-4619
- cpe:2.3:a:open-emr:openemr:4.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4619
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 3 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4619
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2013-4619
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4619
-
https://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt
404 Not Found | TrustwaveVendor Advisory
-
http://sourceforge.net/p/openemr/code/ci/8a8a4607ba5ae2b9eb6b6a3b1b8ed7c6ea7e03b1/
OpenEMR / Code / Commit [8a8a46]
-
http://secunia.com/advisories/54083
Sign inVendor Advisory
-
http://sourceforge.net/p/openemr/discussion/202506/thread/4854b2b1/#9658
OpenEMR / Discussion / Developers:OpenEMR 4.1.1 PatchPatch
Jump to