First published: Mon Apr 18 2022(Updated: )
Multiple SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =5.0.2 | |
Open-emr Openemr | =6.0.0 | |
Phpgacl Project Phpgacl | =3.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13567 is critical with a value of 9.8.
An attacker can exploit CVE-2020-13567 by sending a specially crafted HTTP request that can lead to a SQL injection.
CVE-2020-13567 affects phpGACL 3.3.7, Open-emr Openemr 5.0.2, and Open-emr Openemr 6.0.0.
At the time of this report, no fix or patch has been released for CVE-2020-13567.
The Common Weakness Enumeration (CWE) ID for CVE-2020-13567 is 89.