Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4F8EF639.7050006@redhat.com>
Date: Wed, 18 Apr 2012 11:13:29 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, advisories@...itunasecurity.com
Subject: Re: CVE-request: OpenEMR 4.1.0 SQL-injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/16/2012 11:31 PM, Henri Salo wrote:
> Hello,
> 
> Can I get 2012 CVE-identifier for SQL-injection in OpenEMR 4.1.0,
> thanks.
> 
> Original advisory: http://seclists.org/fulldisclosure/2012/Jan/27 
> OSVDB: http://osvdb.org/78132
> 
> """ Information -------------------- Name :  SQL Injection
> Vulnerability in OpenEMR Software :  OpenEMR 4.1.0 and possibly
> below. Vendor Homepage :  http://www.open-emr.org Vulnerability
> Type :  SQL Injection Severity :  Critical Researcher :  Canberk
> Bolat Advisory Reference :  NS-12-001
> 
> Description -------------------- OpenEMR is a Free and Open Source
> electronic health records and medical practice management
> application. OpenEMR is ONC Complete Ambulatory EHR certified and
> features fully integrated electronic health records, practice
> management, scheduling, electronic billing and
> internationalization.
> 
> Details -------------------- OpenEMR is affected by a SQL Injection
> vulnerability in version 4.1.0. Example PoC url is as follows :
> 
> http://example.com/interface/login/validateUser.php?u='%2b(SELECT%201%20FROM%20(SELECT%20SLEEP(25))A)%2b'
>
>  You can read the full article about SQL Injection vulnerability
> from here : http://www.mavitunasecurity.com/sql-injection/.
> 
> Solution -------------------- The vendor released a patch for this
> vulnerability. Please see the references.
> 
> Credits -------------------- It has been discovered on testing of
> Netsparker, Web Application Security Scanner -
> http://www.mavitunasecurity.com/netsparker/.
> 
> References -------------------- Vendor Url / Patch :
> http://www.open-emr.org/wiki/index.php/OpenEMR_Patches MSL Advisory
> Link 
> :http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/
>
> 
Netsparker Advisories :
http://www.mavitunasecurity.com/netsparker-advisories/

Please use CVE-2012-2115  for this issue.



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJPjvY5AAoJEBYNRVNeJnmTCfIQAJISQeUIZa5XtUU2Y/kZDuEM
NRGkMD4ls2cLdQG8hJE5yPWNH887RhcyoLWkPZKETOygt1QsOs2YzRmae/irPE1M
SBzijpDhommPYPs/RYUb6oaPv5nHZTD5y6ssN2sGDXZkStQdzEfdHxEagNgbIBYj
4hQEZDtEt5cKGUyuWvdrlj7pOpu57L5wieeTf+FdgyOTpEXo5eujsxa/IpaAh0Oi
u4NnVG8I26zCtPhJEYridHH8UUwjgcyzkjJiZmLDOInwfNB5ApFqOUNLu/QGo0sU
jLEsevlXzj5f08+sNNadVp6LTbK1ns5KH/obc6OxOAkF4qgg7ZSwNXem9P6vkhJH
mO/KvVH6V3l9fd6d/NF2OOzMBv/5dmSgjkpd3zTjEi4AE6PDIDfSOH8C0jqY/Bqx
7wmxn0Fia3UP7IIhzC6kTavIcWWOPrTFHdUs9iwOXOQK/+MgqwD0gik1Atoc6h8N
NE9+m4lKcEkMUNDGmTptV0ieEaQRI0tFKR6It3Ty5lHji/KLE9V+2r04LmMRwsiC
4aJNBWRt0+MtK8x59+RA1Q9knOcNNvzAxQS/NOv1EBtL56ncHaql5FRdsR6HjQGr
3jBd0IhbZGfQIT0gStRClFohNpe6m/XB4Kr1dHx/TkDPNILTvf9gAtHoO11Nba6/
4gI6bP6IH5DyFmXfHaCR
=0RXe
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.