- vendor page: https://pacsone.net/
- patched version: 7.1.1
- Credits: Xinjie Ma from Chaitin Research Lab
- 2020.07.19 send report to a vendor's partner
- 2020.07.20 they inform the real vendor
- 2020.08.18 vendor design a fix plan
- 2020.11.10 vendor's partner inform me all vuln has been fixed and offer a bounty
many user input concat or format to response html without any sanitization or check, some filter <scripttag, for example in login.php, but a payload like [http://192.168.25.137/Pacs/login.php?message=%3Cimg%20src=%22%22%20onerror=%22alert(1);%22%3E1%3C/img%3E](http://192.168.25.137/Pacs/login.php?message=1) will bypass the check.
Pacs/userSignup.phpwhen a user sign up, administrator need to review the user. due to no proper sanitization, attacker can insert a xss payload, when admin login to review user sign up requests, will trigger this sotred xss vuln.
-
Pacs/authenticate.php -
$_POST['formUsername']will flow intofopen($file, "w")as part of $file, intended to create or append a file with username as filename inMDPACS/PACS/FailedLoginto count how many failed login tries -
this poc will create a file named test in
c:\, file content will be 1.)
-
this could be used to break the login mechanism by provide
formUsername=../php/security.phpto overwritesecurity.php, this will make other after-auth vuln more dangerous. or overwrite some important config file to cause a denial of service
MDPACS/PACS/php/encapsulatedDoc.php- will not check wether path is legit, can read any file on the server.
- need login first, previously mentioned vulnerablity could bypass the login.
- there are similar behivor in
nocache.php、tempimage.php
MDPACS/PACS/php/importWorklist.php/MDPACS/PACS/php/uploadImage.phpand missing authentication inoriginalImage.php- those page should only let authenicated user to upload file, but due to broken auth, anyone can upload file.
- as below pic shows, no info like
PHPSESSIONIDto identify a user, but can successfully upload a file






