Title | Hospital Management System V1.0 sql |
---|
Description | During a security assessment of the “Hospital Management System (PHP & MySQL) with Source Code,” a critical SQL injection vulnerability was identified in the /staff.php file by nexus-wkx. The vulnerability stems from inadequate validation of the tel parameter, enabling attackers to inject malicious SQL statements. This flaw allows unauthorized database access, manipulation or deletion of data, and exposure of sensitive information. Immediate remediation is necessary to safeguard system integrity and data confidentiality.A SQL injection vulnerability exists in the /staff.php file of the Hospital Management System (PHP & MySQL) v1.0. The issue arises because the application directly incorporates user input from the tel parameter into SQL queries without proper sanitization or validation. This lack of input handling allows attackers to manipulate SQL queries by injecting malicious code. |
---|
Source | ⚠️ https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md |
---|
User | nexus-wkx (UID 79485) |
---|
Submission | 12/26/2024 10:07 AM (3 months ago) |
---|
Moderation | 12/26/2024 06:11 PM (8 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 289352 [CodeZips Hospital Management System 1.0 /staff.php tel sql injection] |
---|
Points | 20 |
---|