A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-5816 | A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T12:25:16.156Z
Reserved: 2020-05-26T00:00:00
Link: CVE-2020-13569
No data.
Status : Modified
Published: 2021-01-28T13:15:11.907
Modified: 2024-11-21T05:01:31.163
Link: CVE-2020-13569
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD