SQL Injection Vulnerability in code-projects Hospital Management System
CVE-2024-12969

6.9MEDIUM

Key Information:

Vendor
CVE Published:
26 December 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A serious SQL injection vulnerability has been identified within the code of the Hospital Management System 1.0, particularly in the functionality related to user authentication via the /admin/index.php file. This vulnerability stems from improper handling of input from the username and password fields, which could allow an attacker to manipulate database queries and gain unauthorized access to sensitive information. The exploit can be executed remotely, increasing the risk to any installations of the affected product. User credentials and other confidential data may be at stake. It is crucial for users of the Hospital Management System to implement the recommended security patches or take immediate steps to mitigate the risks associated with this vulnerability.

Affected Version(s)

Hospital Management System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hexer. (VulDB User)
.
CVE-2024-12969 : SQL Injection Vulnerability in code-projects Hospital Management System | SecurityVulnerability.io