First published: Mon May 16 2022(Updated: )
In HMS 1.0 when requesting appointment.php through POST, multiple parameters can lead to a SQL injection vulnerability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hospital Managment System Project Hospital Managment System | =1.0 | |
Hospital Management System Project Hospital Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-30011.
CVE-2022-30011 has a severity rating of 9.8 (critical).
CVE-2022-30011 affects HMS 1.0, specifically when requesting appointment.php through POST method.
The SQL injection vulnerability occurs when the input from the multiple parameters is not properly validated or sanitized, allowing an attacker to execute arbitrary SQL commands.
Yes, you can find more information about CVE-2022-30011 and potential fixes on the following GitHub links: [https://github.com/kabirkhyrul/HMS/discussions/15](https://github.com/kabirkhyrul/HMS/discussions/15) and [https://github.com/kabirkhyrul/HMS/tree/1.0](https://github.com/kabirkhyrul/HMS/tree/1.0).