Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T18:18:10.003Z
Reserved: 2023-08-07T00:00:00
Link: CVE-2023-39852
Updated: 2024-08-02T18:18:10.003Z
Status : Modified
Published: 2023-08-15T21:15:09.907
Modified: 2024-11-21T08:15:59.963
Link: CVE-2023-39852
No data.
OpenCVE Enrichment
No data.
Weaknesses