vendor:
Dental Clinic Appointment Reservation System
by:
Mesut Cetin
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Dental Clinic Appointment Reservation System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:dental_clinic_appointment_reservation_system
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 18.04 TLS
2021
Dental Clinic Appointment Reservation System 1.0 – Authentication Bypass (SQLi)
Attackers can bypass the admin login page due to unsanitized user input and access internal contents. The vulnerable code is located in /admin/index.php, line 34, where the query is constructed without sanitizing the user input. The payload used is 'admin' or '1' = '1 -- -' which allows the attacker to bypass the authentication.
Mitigation:
Input validation should be used to ensure that user input is sanitized and does not contain malicious code.