First published: Wed Dec 22 2021(Updated: )
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Hospital Management System In Php | =1.0 | |
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-43630 is high with a severity value of 8.8.
CVE-2021-43630 affects Projectworlds Hospital Management System v1.0 by allowing SQL injection via multiple parameters in add_patient.php.
An authenticated malicious user can exploit CVE-2021-43630 to compromise the database system and potentially achieve remote code execution on the remote web server.
To fix CVE-2021-43630 in Projectworlds Hospital Management System v1.0, the SQL injection vulnerability in add_patient.php should be patched by implementing proper input validation and parameterized queries across the application.
More information about CVE-2021-43630 can be found at the following references: [GitHub Issue](https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4) and [Projectworlds](https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/).