Skip to content

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in OpenClinica

High
svadla-oc published GHSA-5289-4jwp-xp9h May 11, 2022

Package

OpenClinica (None)

Affected versions

< 3.16

Patched versions

3.13.1, 3.14.1, 3.16.2

Description

Impact

SQL Injection.

The following locations are vulnerable to SQL injection due to the use of string concatenation to create SQL queries instead of prepared statements.

These vulnerabilities were uncovered and reported by a CodeQL Query from LGTM.com. The below query shows the specific dataflow paths and string concatenations creating the conditions for this vulnerability to exist.

https://lgtm.com/projects/g/OpenClinica/OpenClinica/alerts/?mode=list&tag=security&id=java%2Fsql-injection

A summary of the vulnerabilities can be found below:

Patches

b152cc6

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?
No

References

Severity

High
8.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

CVE ID

CVE-2022-24831

Weaknesses

Credits