On Mon, 29 Jan 2007, [UTF-8] Micha? Melewski wrote:
Dnia 29-01-2007, pon o godzinie 14:11 +0100, bzhbfzj3001@xxxxxxxxxxxxxx
napisaÿÿ(a):
[...]
Unfortunately your advisory is once again, fake. The variable you are
referring to is set in interface/globals.php which is of course included
before the mentioned include statement.
Hmm, it isn't fake - i was able to exploit this bug.
This software (i mean openemr) i so badly written that i have been able
to find few other bugs, like:
"""
Argh, you're right. The problematic code is here:
interface/globals.php:
...
// required for normal operation because of recent changes in PHP:
$ps = strpos($_SERVER['REQUEST_URI'],"myadmin");
if ($ps === false) {
extract($_GET);
extract($_POST);
}
// turn off PHP compatibility warnings
ini_set("session.bug_compat_warn","off");
?>
In other words: Turn off all those pesky security improvements, so that we
may grasp defeat from the jaws of victory. Obviously the number of people
that are running with the retarded allow_url_fopen setting on should be
low but looking at the quality of this software I don't think finding
vulnerabilities that can be exploited in real-life installations should be
hard.
Tinus