vendor:
Hospitals Patient Records Management System
by:
twseptian
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Hospitals Patient Records Management System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE: a:sourcecodester:hospitals_patient_records_management_system:1.0
Platforms Tested: Kali Linux 2021.4
2021
Hospitalss Patient Records Management System 1.0 – ‘id’ SQL Injection (Authenticated)
Hospital's Patient Records Management System v1.0 is vulnerable to SQL injection via the 'id' parameter on the patient list. An attacker can compromise the database of the application using some automated(or manual) tools like SQLmap. Attack vector: On the dashboard navigate to 'Patient List', then go to 'Action' > 'View Records' page using the following URL: http://localhost/hprms/admin/?page=patients/view_patient&id=1. Put the SQL Injection payloads in 'id' field. time-based blind payload : page=patients/view_patient&id=1' AND (SELECT 2664 FROM (SELECT(SLEEP(5)))ixec) AND 'XcAY'='XcAY. Now, the Server target accepted our payload and the response got delayed by 5 seconds.
Mitigation:
Input validation, parameterized queries, and stored procedures can be used to mitigate SQL injection attacks.