
Cloud Vulnerability DB
A community-led vulnerabilities database
A stored cross-site scripting (XSS) vulnerability was discovered in OpenEMR Hospital Information Management System version 6.0.0. The vulnerability was identified in POST requests to /interface/new/newcomprehensivesave.php through the 'formfname' and 'formlname' parameters (Security For Everyone, CVE Mitre).
The vulnerability exists in the POST request handling of the newcomprehensivesave.php file. Specifically, the vulnerability allows attackers to inject malicious code through the 'formfname' and 'formlname' parameters, which are not properly sanitized. This can result in stored XSS attacks where the malicious code is permanently stored on the target servers (Security For Everyone).
The vulnerability can be exploited to steal user data, such as login credentials, or to execute arbitrary actions on behalf of the user. In particular, attackers can potentially take over other user accounts through this vulnerability (Security For Everyone).
To prevent XSS vulnerabilities, several measures are recommended: implement a web application firewall (WAF), perform proper input validation, implement output encoding/escaping, use contextual output encoding/escaping, implement Content Security Policy (CSP), keep all systems and software up-to-date, and use HttpOnly and Secure flags to prevent cookie theft (Security For Everyone).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."