CVE-2020-20444

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-20444
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-20444.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-20444
Published
2021-06-16T16:15:07Z
Modified
2025-01-14T08:37:25.286116Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability .

References

Affected packages

Git / github.com/jact/openclinic

Affected ranges

Type
GIT
Repo
https://github.com/jact/openclinic
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

openclinic_0.*

openclinic_0.7.20040812
openclinic_0.7.20041105
openclinic_0.7.20041207
openclinic_0.8.20061013
openclinic_0.8.20071028
openclinic_0.8.20071029
openclinic_0.8.20071106
openclinic_0.8.20080528
openclinic_0.8.20130107
openclinic_0.8.20130912
openclinic_0.8.20160412