Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-14529 PoC — OpenEMR SQL注入漏洞

Source
Associated Vulnerability
Title:OpenEMR SQL注入漏洞 (CVE-2019-14529)
Description:OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php.
Description
OpenEMR Security issue
Readme
# CVE-2019-14529
Multiple SQL Injection vulnerability in OpenEMR project

**Vulnerable function in file:** /openemr/interface/forms/eye_mag/save.php

**Conditions** : any authorized user

**Vulnerable versions:** <5.0.2, Fixed in 5.0.2 version.

## Description

There are two functions:
 1. "store_PDF", with non filtered variable "encounter",
 2. "canvas", with non two filtered variable "encounter" and "zone".
 
 Both functions use this variables in `DELETE` sql query without any filtration. Both variables controlled by attacker.
 
 Error messages contains code of SQL queries and SQL error message. It can be used for exploit `error-based` type of SQL Injection.
 
 ## Impact
 
 Disclosure of **VERY** sensitive information, since this software used in medical sphere.
 
 ## Other
 
 [OpenEMR official site](https://www.open-emr.org/)
 
 [OpenEMR git repo](https://github.com/openemr)
 
 [Patch for this issue](https://github.com/openemr/openemr/pull/2592)

*P.S. Special thanks to  Brady G. Miller from OpenEMR team for fast response and patches*
File Snapshot

[4.0K] /data/pocs/7cb6a810038aa737cfaaf649489669589f0a845d ├── [848K] Multiple vulnerability SQL Injection.pdf └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →