Vulnerability identifier: #VU29499
Vulnerability risk: High
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-288
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenClinic GA
Web applications /
CMS
Vendor: Frank Verbeke
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exist due to improper implementation of the authentication process. A remote attacker can bypass client-side access controls or use a specially crafted request to initiate a session with limited functionality, which may allow execution of admin functions such as SQL queries.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
OpenClinic GA: 5.09.02 - 5.89.05 b
External links
http://ics-cert.us-cert.gov/advisories/icsma-20-184-01
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.