vendor:
Pharmacy Management System
by:
Boumediene KADDOUR
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Pharmacy Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: unknown
CPE: a:phptpoint:pharmacy_management_system:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: WAMP windows 10 x64
2018
phptpoint Pharmacy Management System 1.0 – ‘username’ SQL injection
phptpoint Pharmacy Management System SQL injection suffers from a SQL injection vulnerability that allows an attacker to bypass the login page and authenticate as admin or any other user. The vulnerable code is located in the index.php file, where the username and password are not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request with a malicious payload.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in a SQL query.