Vulnerability Description
In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameters debug and InsId in interface\billing\sl_eob_process.php leads to multiple cross-site scripting (XSS) vulnerabilities.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Librehealth | Librehealth Ehr | 2.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/LibreHealthIO/lh-ehr/tagsThird Party Advisory
- https://gitlab.com/librehealth/ehr/lh-ehr/-/tagsThird Party Advisory
- https://nitroteam.kz/index.php?action=researches&slug=librehealth_rExploitThird Party Advisory
- https://github.com/LibreHealthIO/lh-ehr/tagsThird Party Advisory
- https://gitlab.com/librehealth/ehr/lh-ehr/-/tagsThird Party Advisory
- https://nitroteam.kz/index.php?action=researches&slug=librehealth_rExploitThird Party Advisory
FAQ
What is CVE-2022-29939?
CVE-2022-29939 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameters debug and InsId in interface\billing\sl_eob_process.php leads to multiple cross-site scripting (XSS) vulnerabilities.
How severe is CVE-2022-29939?
CVE-2022-29939 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29939?
Check the references section above for vendor advisories and patch information. Affected products include: Librehealth Librehealth Ehr.