Skip to content

OpenEMR - Default Admin Discovery

ID: openemr-default-login

Severity: high

Author: Geekby

Tags: openemr,default-login

OpenEMR default admin credentials were discovered.

id: openemr-default-login
info:
name: OpenEMR - Default Admin Discovery
author: Geekby
severity: high
description: OpenEMR default admin credentials were discovered.
reference:
- https://github.com/openemr/openemr-devops/tree/master/docker/openemr/6.1.0/#openemr-official-docker-image
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.html:"OpenEMR"
fofa-query: app="OpenEMR"
product: openemr
vendor: open-emr
tags: openemr,default-login
http:
- raw:
- |
POST /interface/main/main_screen.php?auth=login&site=default HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
new_login_session_management=1&languageChoice=1&authUser={{user}}&clearPass={{pass}}&languageChoice=10
attack: pitchfork
payloads:
user:
- admin
pass:
- pass
matchers-condition: and
matchers:
- type: word
part: header
words:
- "main.php?token_main="
- "OpenEMR"
condition: and
- type: status
status:
- 302
# digest: 4a0a00473045022075f9427be70d875a05d44b7c6781cc78743bb6a5dcb35962c10b458dab719877022100e146dce53fa852ecec456f5886416e1c9b5d4137e9715558011e58471681678e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/openemr/openemr-default-login.yaml"

View on Github