In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameters debug and InsId in interface\billing\sl_eob_process.php leads to multiple cross-site scripting (XSS) vulnerabilities.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/LibreHealthIO/lh-ehr/tags | third party advisory |
https://gitlab.com/librehealth/ehr/lh-ehr/-/tags | third party advisory |
https://nitroteam.kz/index.php?action=researches&slug=librehealth_r | third party advisory exploit |