CVE-2023-39852

Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-39852 - Exploit, Third Party Advisory () https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-39852 - Exploit, Third Party Advisory
References () https://www.sourcecodester.com/php/14182/doctor-appointment-system.html - Product () https://www.sourcecodester.com/php/14182/doctor-appointment-system.html - Product

Information

Published : 2023-08-15 21:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39852

Mitre link : CVE-2023-39852

CVE.ORG link : CVE-2023-39852


JSON object : View

Products Affected

doctor_appointment_system_project

  • doctor_appointment_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')