#VU29499 Authentication bypass using an alternate path or channel in OpenClinic GA


Published: 2020-07-03

Vulnerability identifier: #VU29499

Vulnerability risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-14485

CWE-ID: CWE-288

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenClinic GA
Web applications / CMS

Vendor: Frank Verbeke

Description

The vulnerability allows a remote attacker to bypass authentication process.  

The vulnerability exist due to improper implementation of the authentication process. A remote attacker can bypass client-side access controls or use a specially crafted request to initiate a session with limited functionality, which may allow execution of admin functions such as SQL queries.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

OpenClinic GA: 5.09.02 - 5.89.05 b


External links
http://ics-cert.us-cert.gov/advisories/icsma-20-184-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability