A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ | Third Party Advisory | 
| https://www.blacklanternsecurity.com/blog/ | Third Party Advisory | 
| https://www.cerner.com/solutions/mobility | Product Vendor Advisory | 
| https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ | Third Party Advisory | 
| https://www.blacklanternsecurity.com/blog/ | Third Party Advisory | 
| https://www.cerner.com/solutions/mobility | Product Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.blacklanternsecurity.com/2021-08-13-Cerner-MobileCare-CVE/ - Third Party Advisory | |
| References | () https://www.blacklanternsecurity.com/blog/ - Third Party Advisory | |
| References | () https://www.cerner.com/solutions/mobility - Product, Vendor Advisory | 
Information
                Published : 2021-08-24 12:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36385
Mitre link : CVE-2021-36385
CVE.ORG link : CVE-2021-36385
JSON object : View
Products Affected
                cerner
- mobile_care
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
