phpGACL.acl_admin.php.Reflected.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in phpGACL.
This vulnerability is due to insufficient validation of HTTP parameters. A remote attacker can exploit this vulnerability by enticing a target user into clicking a malicious link. Successful exploitation could allow attacker to perform operations under the security context of other users.
Affected Products
phpGACL 3.3.7 and prior
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the affected application.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/openemr/openemr/commit/71cfa44d4570d30c7435bcc27e53df3afaa9a90a
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2022-03-09 | 20.272 | Sig Added |
2021-03-31 | 18.049 | Default_action:pass:drop |
2021-03-23 | 18.043 |