First published: Mon Feb 01 2021(Updated: )
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phpgacl Project Phpgacl | =3.3.7 | |
Open-emr Openemr | =5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13563 is critical with a CVSS score of 6.1.
CVE-2020-13563 is a cross-site scripting vulnerability that exists in the template functionality of phpGACL 3.3.7, allowing arbitrary JavaScript execution through a specially crafted HTTP request.
CVE-2020-13563 affects phpGACL version 3.3.7 and Open-emr version 5.0.2.
An attacker can exploit CVE-2020-13563 by providing a crafted URL with a malicious payload in the phpGACL template group_id parameter.
Yes, you can find more information about CVE-2020-13563 at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177).