A vulnerability has been found in SourceCodester Doctors Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/patient.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221827.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.221827 | Permissions Required |
https://vuldb.com/?id.221827 | Third Party Advisory |
https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun6.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-02-27 04:15
Updated : 2023-02-28 16:22
NVD link : CVE-2023-1063
Mitre link : CVE-2023-1063
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
doctors_appointment_system_project
- doctors_appointment_system