CVE-2020-13569

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2020-13569
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13569.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-13569
Published
2021-01-28T13:15:11Z
Modified
2024-09-03T03:12:28.877522Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.

References

Affected packages

Git / github.com/openemr/openemr

Affected ranges

Type
GIT
Repo
https://github.com/openemr/openemr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

v2_7_2
v2_7_2-rc1
v2_7_2-rc2
v2_7_3-rc1
v2_8_0
v2_8_1
v2_8_2
v2_8_3
v2_9_0
v3_0_0
v3_0_1
v5_0_2