## https://sploitus.com/exploit?id=SAINT:E91C15905DE22774AF555FEA554C78A5
Added: 05/23/2024
### Background
Mirth Connect is an application which translates message standards for healthcare systems.
### Problem
A deserialization vulnerability in Mirth Connect allows remote attackers to execute arbitrary commands by sending a specially crafted API request.
### Resolution
Upgrade to Mirth Connect 4.4.1 or higher.
### References
https://www.horizon3.ai/attack-research/attack-blogs/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/
### Limitations
Exploit works on Linux systems.
### Platforms
Linux