POC详情: 80019357a348e5d72e9174f8add24a01af0f4633

来源
关联漏洞
标题: Apperta Foundation OpenEyes 信息泄露漏洞 (CVE-2021-40375)
描述:Apperta Foundation OpenEyes是Apperta Foundation基金会的一个开源电子病历(ERP)。 Apperta Foundation OpenEyes 3.5.1 存在安全漏洞,该漏洞允许远程攻击者在没有预期权限级别的情况下查看患者的敏感信息。
描述
Broken Access Control in OpenEyes 3.5.1
介绍
# CVE-2021-40375 - Broken Access Control in OpenEyes 3.5.1

## Description

An improper access control vulnerability was identified in OpenEyes 3.5.1, developed by the Apperta Foundation.

A low privileged user could load a patient's profile in their browser and access sensitive information without the required level of privilege. Despite the application returning a 'Forbidden' message on the webpage, the server response still returned all the information about a patient. This information could be viewed in an intercepting proxy, or simply by viewing the page source within the browser.

## Reproduction
1. As a highly privileged user, view a patient profile.
2. Copy the URL to this patient profile.
3. Log out of the OpenEyes session.
4. Log in with a low privileged user.
5. Paste the patient profile URL in and browse to this.
6. Note that OpenEyes returns a 'Foribidden' message.
7. Right click and click 'View page source'.
8. Note that the sensitive patient information is still returned in the response, and can be viewed in the page source.

## Impact

The patient overview contains sensitive information about the patient. This includes PII such as Date of Birth, NHS number and address. In addition, extensive medical information is disclosed such as medication plans, prescription informations, past appointments, current medical problems or past procdeures.

This information being obtained by a user who is unauthorized could result in a breache of privacy, and impact the confidentiality of patient information stored within the OpenEyes application.

## Demonstration



https://user-images.githubusercontent.com/20635370/131623408-96ea48aa-68b8-4b71-8f00-8da9c9555ed5.mp4


文件快照

[4.0K] /data/pocs/80019357a348e5d72e9174f8add24a01af0f4633 └── [1.7K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。