vendor:
Pharmacy/Medical Store & Sale Point Using PHP/MySQL with Bootstrap Framework
by:
@naivenom
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Pharmacy/Medical Store & Sale Point Using PHP/MySQL with Bootstrap Framework
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:pharmacy/medical_store_&_sale_point_using_phpmysql_bootstrap_framework:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 Pro 1909 (x64_86) + XAMPP 3.2.4
2020
Pharmacy/Medical Store & Sale Point 1.0 – ’email’ SQL Injection
This parameter 'email' is vulnerable to Time-Based blind SQL injection in this path '/medical/login.php' that leads to retrieve all databases.
Mitigation:
Input validation and sanitization, use of prepared statements, use of stored procedures, use of parameterized queries, use of least privilege accounts, use of web application firewalls, use of secure coding practices, use of secure authentication and authorization mechanisms.