A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edoc/doctor/patient.php. The manipulation of the argument search12 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221821 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?id.221821 | Permissions Required |
https://vuldb.com/?ctiid.221821 | Permissions Required |
https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20docker%20search.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-02-27 04:15
Updated : 2023-02-28 16:21
NVD link : CVE-2023-1056
Mitre link : CVE-2023-1056
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
doctors_appointment_system_project
- doctors_appointment_system