Vulnerability Description
SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0 allows an authenticated patient user to dump the database credentials via a SQL injection attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Doctor Appointment System Project | Doctor Appointment System | 1.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-InExploitThird Party AdvisoryVDB Entry
- https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-diExploitThird Party Advisory
- https://www.sourcecodester.com/php/14182/doctor-appointment-system.htmlProduct
- http://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-InExploitThird Party AdvisoryVDB Entry
- https://naku-ratti.medium.com/doctor-appointment-system-1-0-authenticated-sql-diExploitThird Party Advisory
- https://www.sourcecodester.com/php/14182/doctor-appointment-system.htmlProduct
FAQ
What is CVE-2021-27124?
CVE-2021-27124 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0 allows an authenticated patient user to dump the database credentials via a SQL injection attack.
How severe is CVE-2021-27124?
CVE-2021-27124 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-27124?
Check the references section above for vendor advisories and patch information. Affected products include: Doctor Appointment System Project Doctor Appointment System.