Lucene search

K
zdiGuillaume CHANTREL, Florent SaudelZDI-24-468
HistoryMay 17, 2024 - 12:00 a.m.

Sante PACS Server PG Patient Query SQL Injection Remote Code Execution Vulnerability

2024-05-1700:00:00
Guillaume CHANTREL, Florent Saudel
www.zerodayinitiative.com
1
sante pacs server pg
patient query
sql injection
remote code execution
vulnerability
dicom service
tcp port 11122
patient record
network service

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.9%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante PACS Server PG. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the DICOM service, which listens on TCP port 11122 by default. When parsing the NAME element of the PATIENT record, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.9%

Related for ZDI-24-468