Headline
CVE-2022-2298: CVE/POC.md at 63e283e7d7dad3783237f15cdae2bb649bc1e198 · CyberThoth/CVE
A vulnerability has been found in SourceCodester Clinics Patient Management System 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pms/index.php of the component Login Page. The manipulation of the argument user_name with the input admin’ or '1’=’1 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title: Clinic’s Patient Management System 2.0 SQLi****Author: Ashish Kumar (https://www.linkedin.com/in/ashish-kumar-0b65a3184)****Date: 04.07.2022****Vendor: https://www.sourcecodester.com/users/tips23****Software: https://www.sourcecodester.com/php-clinics-patient-management-system-source-code****Version: 2.0****Reference: https://github.com/CyberThoth/CVE/blob/main/CVE/Clinic’s%20Patient%20Management%20System/SQLi/POC.md****Description:****It was discovered that SQL Injection techniques can be used to fool the application into authenticating without the needing valid credentials. SQL Injection vulnerabilities on login pages expose an application to unauthorized access at the administrator level, thereby severely compromising the security of the application.****Status: CRITICAL****[+] Payloads:
Username: = admin' or '1'='1
Password: = Cyberthoth;)
Proof and Exploit: