First published: Wed Jan 10 2024(Updated: )
A Time-Based SQL Injection vulnerability was discovered in Hospital Management System V4.0 which can allow an attacker to dump database information via a crafted payload entered into the 'Admin Remark' parameter under the 'Contact Us Queries -> Unread Query' tab.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGURUKUL Hospital Management System | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2020-26627 vulnerability is considered to have a high severity due to its potential impact on database confidentiality.
To mitigate CVE-2020-26627, ensure that input validation and parameter binding are implemented properly to prevent SQL injection.
CVE-2020-26627 affects Hospital Management System version 4.0.
CVE-2020-26627 facilitates time-based SQL injection attacks allowing unauthorized access to database information.
Yes, CVE-2020-26627 can allow attackers to leak sensitive data from the database through crafted payloads.