Healthcare: 1 Walkthrough
reference | Healthcare: 1 |
target ip | 192.168.1.26 |
Scan with nmap
:
Enumerate HTTP with gobuster
:
Combine these two exploits together:
- CVE-2015-4453 - Authentication bypass in OpenEMR
- CVE-2014-5462 - Multiple Authenticated SQL Injections In OpenEMR
Save the request:
SQLi with sqlmap
to extract table openemr.users:
Crack with john
:
Login into FTP to upload a reverse shell on /var/www/html/openemr
:
Reverse shell:
Escalate from user apache to user medical:
Escalate from user medical to user almirant.
Download /var/backups/shadow
:
Crack with john
:
/home/almirant/user.txt
:
Escalate from user almirant (or medical) to user root.
/usr/bin/healthcheck
:
Privilege escalation:
/root/root.txt
: