OpenEMR File Inclusion and Command Injection Vulnerabilities


Description   High-Tech Bridge SA has discovered multiple vulnerabilities in OpenEMR, which can be exploited by malicious users to disclose sensitive information and compromise a vulnerable system and by malicious people to disclose sensitive information.
1) Input passed via the "formname" parameter to interface/patient_file/encounter/load_form.php, interface/patient_file/encounter/view_form.php, and interface/patient_file/encounter/trend_form.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
2) Input passed via the "formname" parameter to contrib/acog/print_form.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
3) Input passed via the "file" parameter to interface/fax/fax_dispatch.php is not properly sanitised before being used in an "exec()" call. This can be exploited to inject and execute arbitrary shell commands.
Successful exploitation of the vulnerabilities requires that "magic_quotes_gpc" is disabled.
The vulnerabilities are confirmed in version 4.1.0. Other versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
OpenEMR 4.x
     
Solution   Install patch. Please see vendor's advisory for details.
     
CVE   CVE-2012-0992
CVE-2012-0991
     
References   HTB23069:
https://www.htbridge.ch/advisory/HTB23069
OpenEMR:
http://www.open-emr.org/wiki/index.php/OpenEMR_Patches
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Escaped NULL char in URL
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2012-02-01 

 Target Type 
Server 

 Possible exploit 
Remote