A Time-Based SQL Injection vulnerability was discovered in Hospital Management System V4.0 which can allow an attacker to dump database information via a crafted payload entered into the 'Admin Remark' parameter under the 'Contact Us Queries -> Unread Query' tab.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
16 Jan 2024, 15:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-89 | |
| First Time |
Phpgurukul
Phpgurukul hospital Management System |
|
| References | () https://packetstormsecurity.com/files/176302/Hospital-Management-System-4.0-XSS-Shell-Upload-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
| CPE | cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:* |
10 Jan 2024, 13:56
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-10 09:15
Updated : 2024-01-16 15:20
NVD link : CVE-2020-26627
Mitre link : CVE-2020-26627
CVE.ORG link : CVE-2020-26627
JSON object : View
Products Affected
phpgurukul
- hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
