A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edoc/doctor/patient.php. The manipulation of the argument search12 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221821 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20docker%20search.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.221821 | Permissions Required |
https://vuldb.com/?id.221821 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-02-27 12:15
Updated : 2024-05-17 02:17
NVD link : CVE-2023-1056
Mitre link : CVE-2023-1056
CVE.ORG link : CVE-2023-1056
JSON object : View
Products Affected
doctors_appointment_system_project
- doctors_appointment_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')