drbowen wrote on Friday, May 28, 2010:
“You wanted to move the sql.conf file outside of the web directory, because you felt it was a security flaw. I then asked how a hacker would obtain the information in it, and you didn’t know. Perhaps we should focus on known security holes, rather than changing things because they “seem” like they would be a security flaw.”
Brady, just because I personally don’t have the skill to do this doesn’t mean it can’t be done. As noted by Stephen above he apparently knows how and I am sure many others do also.
Every major LAMP based project that I have installed give security tips on how to batten down the hatches for production servers on the web. They always strongly recommend moving the MySQL connection information out of the webroot and give instructions on how to do this. After the install is complete they recommend deleting all the installation commands. The projects that I have looked at generally have not moved the confidential directories out of the webroot but have used some method of controlling access to these directories. As Stephen notes moving these directories out of the webroot would be more secure.
The XOOPs confidential directories were used to create a PayPal phishing scheme in the oemr.org site. This was accomplished by causing the Apache web server to insert the malicious script into one of the the oemr.org confidential directories. The script was introduced to the Apache web server by putting it into the OpenEMR demo login text box and faking an attempt at logging in. This was a cross-site scripting attack. Rod Roark helped ameliorate this problem by placing some lines at the beginning of the globals.php file to prevent this particular attack and so far we haven’t had any more known successful attempts.
There are a number of computer science students at North Carolina State University who have been identifying security holes in OpenEMR and this is in the wiki as noted by Brady above. I think they identified 140 such instances in OpenEMR. Dr. Laurie Williams at NCSU has been working on the security issues of health care programs and OpenEMR is one of the programs see and her students have been focusing on.
There is an interesting article by Dr. Williiams and her group, that these security issues are not addressed by the CCHIT certification process and that these security issues are rampant among all EHR / EMR programs:
http://www.google.com/url?sa=t&source=web&ct=res&cd=2&ved=0CBcQFjAB&url=ftp%3A%2F%2Fftp.csc.ncsu.edu%2Fpub%2Ftech%2F2010%2FTR-2010-1.pdf&rct=j&q=openemr+security+ncsu.edu&ei=Qrz_S_WwBMXflgfikcj4CQ&usg=AFQjCNEAgeaPopXPxG0WAZqDL0tx0U6-LA&sig2=W9kMXED0j9QHCWzL5T5C2A
As a group we had decided to focus on the Meaningful Use Certification Project first and then come back in a second wave and work on the known security problems. We haven’t had the resources to take on both projects and systematically go through the list. If you have the interest and the resources to do so, going through this list and helping with these security issues would be a big benefit to the OpenEMR project.
Sam Bowen, MD
http://openmedsoftware.org