Synopsis
The remote web server contains a PHP application that is prone to a remote file include attack.
Description
The remote host is running OpenEMR, a web-based medical records application written in PHP.
The version of OpenEMR installed on the remote host fails to sanitize input to the 'fileroot' parameter before using it in the 'contrib/forms/evaluation/C_FormEvaluation.class.php' script to include PHP code. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be able to exploit this flaw to view arbitrary files on the remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.
Solution
Disable PHP's 'register_globals' setting as the application does not require it.
Plugin Details
File Name: openemr_fileroot_file_include.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Vulnerability Information
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 6/7/2006