Skip to content

Commit 637caa9

Browse files
authored
Update index.md
1 parent 694b662 commit 637caa9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cache/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -229,7 +229,7 @@ We find 2 interesting links:
229229
OpenEMR < 5.0.1 - (Authenticated) Remote Code Execution: [https://www.exploit-db.com/exploits/45161](https://www.exploit-db.com/exploits/45161).
230230
Of course, we need creds to run this exploit but it also gives a [link](https://www.youtube.com/watch?v=DJSQ8Pk_7hc) to a youtube video showing a SQLi exploitation. I had a look at it and it clearly shows where you can perfom the SQLi.
231231
- OpenEMR Version < 5.0.1 Remote Code execution vulnerability: [https://medium.com/@musyokaian/openemr-version-5-0-1-remote-code-execution-vulnerability-2f8fd8644a69](https://medium.com/@musyokaian/openemr-version-5-0-1-remote-code-execution-vulnerability-2f8fd8644a69).
232-
This is truely the better link I found. It confirms you can perform a SQL injection on the page to get credential and then provide a python script to exploitthe remote code execution vylnerability.
232+
This is truely the better link I found. It confirms you can perform a SQL injection on the page to get credentials and then provide a python script to exploit the remote code execution vulnerability.
233233

234234
First click on Register onthe page [http://hms.htb/portal/](http://hms.htb/portal/). Then, when trying to go to the page http://hms.htb/portal/add_edit_event_user.php?eid=1', we obtain the following result:
235235

0 commit comments

Comments
 (0)