First published: Tue Nov 26 2024(Updated: )
A vulnerability has been found in CodeAstro Hospital Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /backend/admin/his_admin_register_patient.php of the component Add Patient Details Page. The manipulation of the argument pat_fname/pat_ailment/pat_lname/pat_age/pat_dob/pat_number/pat_phone/pat_type/pat_addr leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGURUKUL Hospital Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11675 is classified as a problematic vulnerability affecting the CodeAstro Hospital Management System 1.0.
To mitigate CVE-2024-11675, it is recommended to update or patch the CodeAstro Hospital Management System to a secured version or implement input validation and sanitization on the affected component.
CVE-2024-11675 affects the Add Patient Details Page functionality located in the /backend/admin/his_admin_register_patient.php file.
The vulnerability in CVE-2024-11675 allows for potential manipulation of patient data during the registration process.
CVE-2024-11675 specifically affects version 1.0 of the PHPGURUKUL Hospital Management System.