Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-40375 PoC — Apperta Foundation OpenEyes 信息泄露漏洞

Source
Associated Vulnerability
Title:Apperta Foundation OpenEyes 信息泄露漏洞 (CVE-2021-40375)
Description:Apperta Foundation OpenEyes 3.5.1 allows remote attackers to view the sensitive information of patients without having the intended level of privilege. Despite OpenEyes returning a Forbidden error message, the contents of a patient's profile are still returned in the server response. This response can be read in an intercepting proxy or by viewing the page source. Sensitive information returned in responses includes patient PII and medication records or history.
Description
Broken Access Control in OpenEyes 3.5.1
Readme
# CVE-2021-40375 - Broken Access Control in OpenEyes 3.5.1

## Description

An improper access control vulnerability was identified in OpenEyes 3.5.1, developed by the Apperta Foundation.

A low privileged user could load a patient's profile in their browser and access sensitive information without the required level of privilege. Despite the application returning a 'Forbidden' message on the webpage, the server response still returned all the information about a patient. This information could be viewed in an intercepting proxy, or simply by viewing the page source within the browser.

## Reproduction
1. As a highly privileged user, view a patient profile.
2. Copy the URL to this patient profile.
3. Log out of the OpenEyes session.
4. Log in with a low privileged user.
5. Paste the patient profile URL in and browse to this.
6. Note that OpenEyes returns a 'Foribidden' message.
7. Right click and click 'View page source'.
8. Note that the sensitive patient information is still returned in the response, and can be viewed in the page source.

## Impact

The patient overview contains sensitive information about the patient. This includes PII such as Date of Birth, NHS number and address. In addition, extensive medical information is disclosed such as medication plans, prescription informations, past appointments, current medical problems or past procdeures.

This information being obtained by a user who is unauthorized could result in a breache of privacy, and impact the confidentiality of patient information stored within the OpenEyes application.

## Demonstration



https://user-images.githubusercontent.com/20635370/131623408-96ea48aa-68b8-4b71-8f00-8da9c9555ed5.mp4


File Snapshot

[4.0K] /data/pocs/80019357a348e5d72e9174f8add24a01af0f4633 └── [1.7K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →