First published: Tue Apr 13 2021(Updated: )
SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit”, the POST parameter parent_id leads to a SQL injection.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =5.0.2 | |
Phpgacl Project Phpgacl | =3.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13568 is a SQL injection vulnerability found in phpGACL 3.3.7.
CVE-2020-13568 has a severity rating of 8.8 (high).
CVE-2020-13568 can be triggered by sending a specially crafted HTTP request to the admin/edit_group.php file in phpGACL 3.3.7, where the POST parameter action is set to "Submit" and the POST parameter parent_id is manipulated to perform a SQL injection attack.
Open-emr Openemr version 5.0.2 and Phpgacl Project Phpgacl version 3.3.7 are affected by CVE-2020-13568.
To fix CVE-2020-13568, it is recommended to update phpGACL to a version that includes the necessary security patches.