A vulnerability has been found in SourceCodester Doctors Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/patient.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221827.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/edoc%20doctor%20appointment%20system/edoc%20doctor%20appointment%20system%20vlun6.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.221827 | Permissions Required |
https://vuldb.com/?id.221827 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-02-27 12:15
Updated : 2024-05-17 02:17
NVD link : CVE-2023-1063
Mitre link : CVE-2023-1063
CVE.ORG link : CVE-2023-1063
JSON object : View
Products Affected
doctors_appointment_system_project
- doctors_appointment_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')