Share
## https://sploitus.com/exploit?id=SAINT:E91C15905DE22774AF555FEA554C78A5
Added: 05/23/2024  


### Background

[Mirth Connect](<https://github.com/nextgenhealthcare/connect/>) is an application which translates message standards for healthcare systems. 

### Problem

A deserialization vulnerability in Mirth Connect allows remote attackers to execute arbitrary commands by sending a specially crafted API request. 

### Resolution

[Upgrade](<https://github.com/nextgenhealthcare/connect/>) to Mirth Connect 4.4.1 or higher. 

### References

<https://www.horizon3.ai/attack-research/attack-blogs/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/>  


### Limitations

Exploit works on Linux systems. 

### Platforms

Linux