SQL Injection Vulnerability in E-Health Care System by Code-Projects
CVE-2024-10808

7.5HIGH

Key Information:

Vendor
CVE Published:
5 November 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A critical security flaw has been identified in the E-Health Care System version 1.0 by Code-Projects. The vulnerability resides in the code responsible for processing requests in the file req_detail.php. By manipulating the 'id' parameter, an attacker can execute SQL injection attacks, potentially gaining unauthorized access to sensitive database information. This vulnerability is particularly concerning as it can be exploited remotely, allowing attackers to target systems without direct access. The details of the exploit have already been made public, increasing the urgency for users of the affected software to implement mitigating measures immediately.

Affected Version(s)

E-Health Care System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Koevas (VulDB User)
.
CVE-2024-10808 : SQL Injection Vulnerability in E-Health Care System by Code-Projects | SecurityVulnerability.io