
CVE-2020-29143
https://notcve.org/view.php?id=CVE-2020-29143
15 Feb 2021 — A SQL injection vulnerability in interface/reports/non_reported.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter. Una vulnerabilidad de inyección SQL en el archivo interface/reports/non_reported.php en OpenEMR versiones anteriores a 5.0.2.5, permite a un atacante autenticado remoto ejecutar comandos SQL arbitrarios por medio del parámetro form_code • https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-29139
https://notcve.org/view.php?id=CVE-2020-29139
15 Feb 2021 — A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter. Una vulnerabilidad de inyección SQL en el archivo interface/main/finder/ patient_select.php de library/patient.inc en OpenEMR versiones anteriores a 5.0.2.5 permite que un atacante autenticado remotamente ejecute comandos SQL arbitrarios por medio del parámetro searchFields • https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-29140
https://notcve.org/view.php?id=CVE-2020-29140
15 Feb 2021 — A SQL injection vulnerability in interface/reports/immunization_report.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter. Una vulnerabilidad de inyección SQL en el archivo interface/reports/immunization_report.php en OpenEMR versiones anteriores a 5.0.2.5, permite a un atacante autenticado remoto ejecutar comandos SQL arbitrarios por medio del parámetro form_code • https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-29142
https://notcve.org/view.php?id=CVE-2020-29142
15 Feb 2021 — A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings. Una vulnerabilidad de inyección SQL en el archivo interface/usergroup/usergroup_admin.php en OpenEMR versiones anteriores a 5.0.2.5, permite a un atacante autenticado remoto ejecutar comandos SQL arbitrarios por medio del parámetro schedule_facility ... • https://community.open-emr.org/t/openemr-6-0-0-has-been-released/15732 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-13565
https://notcve.org/view.php?id=CVE-2020-13565
10 Feb 2021 — An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability. Se presenta una vulnerabilidad de redireccionamiento abierto en la funcionalidad de redirección return_page de phpGACL versión 3.3.7, OpenEMR versión 5.0.2 y la versi... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2020-13564
https://notcve.org/view.php?id=CVE-2020-13564
01 Feb 2021 — A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter. Se presenta una vulnerabilidad de tipo cross-site scripting en la funcionalidad template de phpGACL versión 3.3.7. Una petición HTTP especialmente diseñada puede conllevar a una ejecución arbitraria de JavaScript. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2020-13563
https://notcve.org/view.php?id=CVE-2020-13563
01 Feb 2021 — A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter. Se presenta una vulnerabilidad de tipo cross-site scripting en la funcionalidad template de phpGACL versión 3.3.7. Una petición HTTP especialmente diseñada puede conllevar a una ejecución arbitraria de JavaScript. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2020-13562
https://notcve.org/view.php?id=CVE-2020-13562
01 Feb 2021 — A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter. Se presenta una vulnerabilidad de tipo cross-site scripting en la funcionalidad template de phpGACL versión 3.3.7. Una petición HTTP especialmente diseñada puede conllevar a una ejecución arbitraria de JavaScript. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2020-13569
https://notcve.org/view.php?id=CVE-2020-13569
28 Jan 2021 — A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability. Se presenta una vulnerabilidad de tipo cross-site request forgery en la funcionalidad GACL de OpenEMR versión 5.0.2 y versión de desarrollo 6.0.0 (commit babec... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2019-16404
https://notcve.org/view.php?id=CVE-2019-16404
21 Oct 2019 — Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter. Una Inyección SQL autenticada en el archivo interface/forms/eye_mag/js/eye_base.php en OpenEMR versiones hasta 5.0.2, permite al usuario extraer datos arbitrarios de la base de datos de openemr por medio de una instrucción INSERT INTO no parametrizada, como ... • https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16404/README.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •