For background, see my previous blog post describing the details of three security vulnerabilities in C-CDA Display using HL7’s CDA.xsl.
Last month I discovered a set of security vulnerabilities in a well-known commercial EHR product that I’ll pseudonymously call “Friendly Web EHR”. Here’s the story…
The story: discovery and reporting
I was poking around my account in Friendly Web EHR, examining MU2 features like C-CDA display and Direct messaging. I used the “document upload” feature to upload some C-CDAs from SMART’s Sample C-CDA Repository. At the time, I was curious about the user experience. (Specifically, I was bemoaning how clunky the standard XSLT-based C-CDA rendering looks.) I wondered how the C-CDA viewer was embedded into the EHR. Was it by direct DOM insertion? Inline frames? I opened up Chrome Developer Tools to take a look.
It turned out to be an iframe
pointing to a standalone C-CDA viewer module. Interestingly the src
URL of the iframe included two URL parameters: an identifier for the document that I was viewing, and some kind of security token. A bit of investigation revealed that this token was identical to my main EHR session token: in other words, a full session-equivalent was embedded into the iframe/@src
URL!
This was dangerous, because it meant that a malicious document could steal my EHR session merely by leaking its own URL to an attacker. This kind of leakage occurs by default in modern web browsers, in the form of Referer
headers: every time a typical browser fetches an external resource like an image, it includes a header with the URL of the current page. So if I could merely reference an external image in my C-CDA, I’d have an attack vector.
I started looking through HL7’s example stylesheet and saw that the renderMultiMedia
template allowed the creation of img
tags with an arbitrary src
attribute. That would be all I needed…
But it occurred to me that a 2274-line XSLT file might have other vulnerabilities. I started hunting for loopholes that would allow execution of JavaScript code, and I discovered the two XSS vulnerabilities I described in my SMART Platforms blog post.
I decided to try these out against my own account in Friendly Web EHR, and sure enough I was able to:
- Leak a session token back to a remote server, and
- Execute arbitrary JavaScript in the browser, accessing cookies as well as a session token
If you’re interested in exploring a low-fidelity re-creation of the vulnerable C-CDA viewer, I’ve put together a working simulation that demonstrates the key issues. Don’t worry: it’s just a demonstration, and perfectly safe to view!
See: simulation | source |
At this point, about 5pm on a Saturday, I reported the discovery by e-mailing a contact at Friendly Web EHR. I heard back Sunday evening with a request for more details. I provided these, including an example document demonstrating the vulnerabilities (see the simulation above). They confirmed the vulnerabilities, and over a few follow-up sessions we discussed the problems in detail. By that Thursday night (five days after the report) they had a fix in place.
Round two: non-XSLT viewers and viral vectors
When I returned to Friendly Web EHR after the initial fix was ready, I realized that the EHR actually included two different C-CDA viewers. The one I had initially explored was based on HL7’s CDA.xsl, but a second viewer offered a much more compelling user experience. This second viewer was built right into the EHR’s Direct inbox feature, and could be used to open C-CDA attachments to Direct messages.
When I looked through the JavaScript source code, I noticed Friendly Web EHR used the Handlebars templating library to insert a C-CDA view into the Direct inbox — and that view was inserted using an unscaped markup expression like {{{ ccda_markup }}}
. This was potentially an opportunity to inject rogue markup into the DOM.
I set up a HealthVault account and discovered that as a patient, I could send Direct messages to my clinician account in Friendly Web EHR. Using this account, I tried sending documents with the exploits that I had discovered previously, but to no avail.
And then on a hunch I tried adding a CDATA
block to a C-CDA narrative text element, to create something like:
<section>
<text>
<![CDATA[
<script>
alert('document.cookie');
</script>
]]>
</text>
</section>
This resulted in HTML that was close to what I needed, but the opening script
tag was wrapped in a comment block. Something like:
<!-- <script> -->
alert('document.cookie');
</script>
Again on a hunch, I tweaked my payload by duplicating the opening <script>
tag — and sure enough, I was able to inject JavaScript into the EHR session.
Serious danger: potential for viral spread
This vulnerability was potentially far more concerning than the earlier ones, because it was an issue with the C-CDA viewer attached to Friendly Web EHR’s Direct inbox. What this means is that a motivated attacker could turn this vulnerability into a viral (self-spreading) vector, by following a sequence of steps like:
- Craft a malicious document and send it via Direct message to any Friendly Web EHR clinician.
- When viewed, the document hijacks a user’s EHR session and issues a set of calls to Friendly Web EHR’s internal (undocumented) API.
- Issue an API call to fetch a clinician’s contacts from her address book.
- For each contact, issue an API call to send a new Direct message containing a new copy of the malicious document. (To make this realistic, it would be designed to look like a referral note with patient data attached.)
This sequence of steps could allow an attacker to harvest large quantities of protected health information in short order.
Wrapping up
I reported this additional vulnerability to Friendly Web EHR, and they fixed it by the following Thursday.
In the meantime, I attempted to contact every Web-based EHR vendor I could identify, to notify them about the CDA.xsl vulnerabilities. I’ll describe the discouraging results of that reporting effort in a subsequent post!