First published: Sun Aug 06 2023(Updated: )
A vulnerability was found in SourceCodester Online Hospital Management System 1.0. It has been classified as critical. Affected is an unknown function of the file patientlogin.php. The manipulation of the argument loginid/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-236220.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mayurik Online Hospital Management System | =1.0 | |
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4185 is critical with a CVSS score of 9.8.
The affected software version of CVE-2023-4185 is Mayurik Online Hospital Management System 1.0.
The vulnerability type of CVE-2023-4185 is SQL Injection (CWE-89).
An attacker can exploit CVE-2023-4185 by manipulating the arguments loginid/password in the patientlogin.php file to perform SQL injection attacks.
Yes, you can find more information about CVE-2023-4185 in the following references: [link1](https://vuldb.com/?id.236220), [link2](https://vuldb.com/?ctiid.236220), [link3](https://github.com/Yusoyea/VulList/blob/main/Hospital%20Management%20System%20patientlogin.php%20has%20Sqlinjection.pdf).