Title | Hospital Management System V1.0 sql |
---|
Description | During a security assessment of the “Hospital Management System (PHP & MySQL) with Source Code,” a critical SQL injection vulnerability was identified in the /staff.php file by nexus-wkx. The vulnerability stems from inadequate validation of the tel parameter, enabling attackers to inject malicious SQL statements. This flaw allows unauthorized database access, manipulation or deletion of data, and exposure of sensitive information. Immediate remediation is necessary to safeguard system integrity and data confidentiality.A SQL injection vulnerability exists in the /staff.php file of the Hospital Management System (PHP & MySQL) v1.0. The issue arises because the application directly incorporates user input from the tel parameter into SQL queries without proper sanitization or validation. This lack of input handling allows attackers to manipulate SQL queries by injecting malicious code. |
---|
Source | ⚠️ https://github.com/nexus-wkx/CVE/blob/main/SQL_Injection_in_Hospital_Management_System.md |
---|
User | nexus-wkx (UID 79485) |
---|
Submission | 2024年12月26日 10:07 (4 月 ago) |
---|
Moderation | 2024年12月26日 18:11 (8 hours later) |
---|
Status | 承諾済み |
---|
VulDB Entry | 289352 [CodeZips Hospital Management System 1.0 /staff.php tel SQLインジェクション] |
---|
Points | 20 |
---|