Description
An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.
Problem types
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-434 Unrestricted Upload of File with Dangerous Type
Product status
* (semver)
Credits
xistence
References
raw.githubusercontent.com/.../openemr_sqli_privesc_upload.rb
www.exploit-db.com/exploits/28329
www.exploit-db.com/exploits/28408
raw.githubusercontent.com/.../openemr_sqli_privesc_upload.rb
www.exploit-db.com/exploits/28329
www.exploit-db.com/exploits/28408
www.open-emr.org/
github.com/openemr/openemr
www.vulncheck.com/advisories/openemr-sqli-priv-esc-rce