A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System 1.0. This vulnerability affects unknown code of the file /pms/ajax/check_user_name.php. The manipulation of the argument user_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/qqlove555/cve/blob/main/sql.md | Exploit |
| https://vuldb.com/?ctiid.274744 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.274744 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.391540 | Third Party Advisory VDB Entry |
Configurations
History
21 Aug 2024, 14:12
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Oretnom23
Oretnom23 clinics Patient Management System |
|
| References | () https://github.com/qqlove555/cve/blob/main/sql.md - Exploit | |
| References | () https://vuldb.com/?ctiid.274744 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.274744 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.391540 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 7.5 |
19 Aug 2024, 13:00
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
15 Aug 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-15 22:15
Updated : 2024-08-21 14:12
NVD link : CVE-2024-7841
Mitre link : CVE-2024-7841
CVE.ORG link : CVE-2024-7841
JSON object : View
Products Affected
oretnom23
- clinics_patient_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
