Owasp healthcare cms

Dec. 15, 2014
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
Owasp healthcare cms
1 of 16

More Related Content

Slideshows for you

Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)Adam Nurudini
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationNikola Milosevic
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
Web browser and Security ThreatsWeb browser and Security Threats
Web browser and Security ThreatsHTS Hosting
Cyber pptCyber ppt
Cyber pptkarthik menon
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web SecuritySharePointRadi

Similar to Owasp healthcare cms

Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017ibrahimumer2
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in PracticeSecurity Innovation
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacksFrank Victory
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Miguel de la Cruz

More from uisgslide

Стандарт верифікації безпеки веб-додатків ASVS 3.0Стандарт верифікації безпеки веб-додатків ASVS 3.0
Стандарт верифікації безпеки веб-додатків ASVS 3.0uisgslide
Коментарі до концепції інформаційної безпекиКоментарі до концепції інформаційної безпеки
Коментарі до концепції інформаційної безпекиuisgslide
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...uisgslide
Необхідність реформи галузі захисту інформації в УкраїніНеобхідність реформи галузі захисту інформації в Україні
Необхідність реформи галузі захисту інформації в Україніuisgslide
Sandbox kievSandbox kiev
Sandbox kievuisgslide
Comments glib pakharenkoComments glib pakharenko
Comments glib pakharenkouisgslide

Recently uploaded

办美国本科毕业证实拍图毕业证本科硕士文凭哪家好办美国本科毕业证实拍图毕业证本科硕士文凭哪家好
办美国本科毕业证实拍图毕业证本科硕士文凭哪家好sovcyuv
格拉斯哥大学假文凭英国假文凭回国找工作格拉斯哥大学假文凭英国假文凭回国找工作
格拉斯哥大学假文凭英国假文凭回国找工作uncesxy
Release Notes.docRelease Notes.doc
Release Notes.docGigiKent17
毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]
毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]yovuyhp
Dokumen.docxDokumen.docx
Dokumen.docxWILIAN72
Bioinformatics2015.pdfBioinformatics2015.pdf
Bioinformatics2015.pdfAbdetaImi

Owasp healthcare cms

  1. Healthcare CMS: broken bad Alexander Antukh OWASP Russia 29/11/2014

  2. Web application framework “designed to support the development of dynamic websites, web applications, web services and web resources”

  3. CMS: special purpose • Enterprise • Documents • Web shops • … • Healthcare specially built for hospitals, health systems and clinics and provide an easy, secure and convenient way to manage medical data

  4. Korea “Vizensoft is one of the major software vendors, especially aimed at medical organizations in Korea” http://www.vizenmedical.com

  5. Vizensoft • Board • Consultation • Reservation • Members • SMS • E-MAIL • Weblog Typical menu from the vizensoft admin panel

  6. Vizensoft Attackers are able to completely compromise the web application built upon Vizensoft CMS as they can gain access to the system and database level and manage the website as an admin without prior authentication! http://bit.ly/1zGCyuW

  7. Vulnerabilities • Multiple Cross Site Scripting issues (medium) • Source code disclosure (high) • Missing Password Policy (high) • Multiple Unauthenticated SQL Injection issues (critical) • Admin Backdoor Account (critical) • Authentication Bypass (critical) • Arbitrary File Upload (critical) http://bit.ly/1zGCyuW

  8. Multiple Cross Site Scripting issues No comments. Nearly every output parameter is vulnerable! „Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc“ In fact, even single occurence gives an attacker full control over the web application in victim‘s context!

  9. Source code disclosure down.php?path=<path_to_target_file>* Dotes are filtered, however, files inside /www/… are still accessible! * link modified according to responsible disclosure policies // a.k.a. “limited path traversal” • configuration files with passwords and internal information • framework source code • personal users‘ files • any other protected information

  10. Missing Password Policy How strong is strong enough? 174125:xGSfdgYq!@44s#abgf root:Qwerty123 admin:09111989 test:test a:a First break-in after information disclosure was (quite often) done due to lack of password policies!

  11. Multiple SQL Injection issues’ or ‘’=‘ 15+ years old, still actual and extremely dangerous Gives an attacker direct access to database, often allowing to modify data and even execute arbitrary code on the server Unauthenticated attacker could fully exploit the vulnerability all the health information about registered users is not protected anymore Lazy-bastard (trivial) way: sqlmap.py

  12. Admin Backdoor Account id no password registdate test 3 <cut> 2014-xx-xx admin 2 <cut> 2014-xx-xx vizensoft 1 <cut> 2013-xx-xx invisible SQL injection gives an attacker SHA-1 hash, which can be bruted easily. When obtained, it poses extreme security risk to anyone who‘s using the software! Admin cannot modify/disable it! Symantec Web Gateway // NICE Systems // Recording eXpress // many routers... http://bit.ly/1yi3hdB

  13. Authentication Bypass • Something user knows • Something user has • Something user is “The World's Most Misunderstood Programming Language” Not only client checks alone ain‘t provide necessary level of security – in the case it let the attacker completely bypass auth process and have direct access to admin panel by just turning JS off!

  14. Arbitrary File Upload Filename extension checks are only done on client and not on the server side, which makes it extremely easy for an attacker to circumvent it and upload a desired file anyway

  15. Morale Admin Backdoor Account Make sure you don‘t have any backdoors in used systems Authentication Bypass Use only reliable and known methods of auth/auth Arbitrary File Upload Make sure you don’t invent the bicycle Multiple Cross Site Scripting issues Sanitize output Multiple Unauthenticated SQL Injection issues Prepared statements! Source code disclosure Avoid dynamic file access and use whitelisting Missing Password Policy a:a is NOT secure enough ;) Category:Attack

  16. Thank you for your attention!