Lucene search

K
huntrR00tpgp0E281EA2-70F7-4ED7-8814-74502EFF9DD5
HistoryMar 21, 2022 - 5:15 a.m.

Reflected Cross Site Scripting

2022-03-2105:15:14
r00tpgp
www.huntr.dev
20

0.003 Low

EPSS

Percentile

69.2%

Vulnerability Type

Reflected Cross Site-Scripting (XSS)

Affected URL

https://localhost/openemr-6.0.0/interface/main/calendar/index.php

Affected Parameters

“newname”

Authentication Required?

Yes

Issue Summary

A reflected XSS vulnerability found in “/interface/main/calendar/index.php” that allows Admin user to inject arbitrary web script in one parameter (newname). The XSS payload will be reflected in the Confirmation page after the user click on Save for the new categories in Calendar.

Recommendation

Ensure to HTML encode before inserting any untrusted data into HTML element content. Ensure all inputs entered by user should be sanitized and validated before processing and storage.
Inputs should be filtered by the application, for example removing special characters such as < and > as well as special words such as script.

Credits

Aden Yap Chuen Zhen ([email protected])
Rizan, Sheikh ([email protected])
Ali Radzali ([email protected])

Issue Reproduction

Login as an Admin. Click on Administration > Clinic > Calendar and click on Categories after that.

1.png
Figure 1: Login as Admin and Go to Calendar (Under Administration)

In New Category, insert this payload in the Name input box. Once done, click on Save.

&lt;script&gt;alert(document.cookie)&lt;/script&gt;

2.png
Figure 2: Insert Payload in Name

The XSS will be reflected on the confirmation page with the user cookies.

3.png
Figure 3: Reflected XSS in Confirmation Page

0.003 Low

EPSS

Percentile

69.2%

Related for 0E281EA2-70F7-4ED7-8814-74502EFF9DD5