Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
References
Link | Resource |
---|---|
https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-39852 | Exploit Third Party Advisory |
https://www.sourcecodester.com/php/14182/doctor-appointment-system.html | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-08-15T00:00:00
Updated: 2024-06-04T17:27:07.423Z
Reserved: 2023-08-07T00:00:00
Link: CVE-2023-39852
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-15T21:15:09.907
Modified: 2024-06-04T19:17:37.793
Link: CVE-2023-39852
JSON object: View
Redhat Information
No data.
CWE