Vulnerability Description
C4G Basic Laboratory Information System 3.4 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through the site parameter. Attackers can send GET requests to the users_select.php endpoint with crafted SQL payloads to extract sensitive database information including patient records and system credentials.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gatech | Computing For Good\'S Basic Laboratory Information System | <= 3.4 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/46438ExploitVDB Entry
- https://www.vulncheck.com/advisories/c4g-blis-sql-injection-via-users-select-phpThird Party Advisory
FAQ
What is CVE-2019-25678?
CVE-2019-25678 is a vulnerability with a CVSS score of 8.2 (HIGH). C4G Basic Laboratory Information System 3.4 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through t...
How severe is CVE-2019-25678?
CVE-2019-25678 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25678?
Check the references section above for vendor advisories and patch information. Affected products include: Gatech Computing For Good\'S Basic Laboratory Information System.