Overview
drchrono Electronic Health Record (EHR) web applications allow cross-site scripting (XSS) and cross-site request forgery (CSRF) that could allow an attacker to obtain sensitive patient information.
Description
drchrono provides an EHR web application service at drchrono.com, onpatient.com, and possibly other domains. The application contains XSS (CWE-80) and CSRF (CWE-352) vulnerabilities:
To exploit these vulnerabilities, an attacker would need to 1.) be (or act as) an authenticated user to upload or send malicious content or 2.) entice an authenticated user (most likely a clinician) to access the attacker's uploaded content or a web page hosted by the attacker. |
Impact
By uploading or enticing a user to visit a specially crafted web page (either uploaded to the application or hosted by the attacker), an attacker can obtain nearly any EHR data, including sensitive patient health records and personally identifying information (PII). |
Solution
These vulnerabilities have been fixed as of 6 Oct 2014. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Temporal | 4.4 | E:POC/RL:U/RC:UR |
Environmental | 3.6 | CDP:ND/TD:M/CR:H/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Josh Mandel for researching and reporting these vulnerabilities, and drchrono for engaging and resolving them.
This document was written by Art Manion.
Other Information
CVE IDs: | None |
Date Public: | 2014-10-29 |
Date First Published: | 2014-10-29 |
Date Last Updated: | 2014-10-29 18:42 UTC |
Document Revision: | 12 |