Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T18:18:10.003Z

Reserved: 2023-08-07T00:00:00

Link: CVE-2023-39852

cve-icon Vulnrichment

Updated: 2024-08-02T18:18:10.003Z

cve-icon NVD

Status : Modified

Published: 2023-08-15T21:15:09.907

Modified: 2024-11-21T08:15:59.963

Link: CVE-2023-39852

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses