First published: Tue Apr 13 2021(Updated: )
SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete”, the POST parameter delete_group leads to a SQL injection.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =5.0.2 | |
Phpgacl Project Phpgacl | =3.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13566 is high (8.8).
The affected software for CVE-2020-13566 is Open-emr 5.0.2 and Phpgacl Project Phpgacl 3.3.7.
CVE-2020-13566 is a SQL injection vulnerability in phpGACL 3.3.7 that can be exploited through a specially crafted HTTP request.
An attacker can exploit CVE-2020-13566 by sending a specially crafted HTTP request to the admin/edit_group.php page with the POST parameter action set to "Delete" and the POST parameter delete_group leading to a SQL injection.
There is no specific fix mentioned for CVE-2020-13566, but it is recommended to update to a patched version of phpGACL to address this vulnerability.