S4E

CVE-2020-22165 Scanner

CVE-2020-22165 Scanner - SQL Injection vulnerability in PHPGurukul Hospital Management System

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

10 days 7 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

PHPGurukul Hospital Management System is commonly used by hospitals and healthcare facilities for efficient management of patient data, appointments, and billing. Developed using PHP, this system offers a comprehensive solution that aims to streamline hospital administration activities. It is utilized by IT departments in hospitals to ensure data management tasks are performed effectively. The software is appreciated for its user-friendly interface and robust feature set. By automating various hospital processes, it allows healthcare professionals to focus more on patient care. Overall, PHPGurukul Hospital Management System is aimed at improving operational efficiency in hospital settings.

The SQL Injection vulnerability identified in PHPGurukul Hospital Management System allows attackers to manipulate database queries by injecting malicious SQL statements. This vulnerability can be exploited by remote unauthenticated users, making it a critical security issue. Attackers can exploit this flaw to breach the database, potentially leading to unauthorized access to sensitive data. The vulnerability stems from a lack of input sanitization and improper handling of user-supplied data. The user-login.php endpoint is particularly susceptible, where the injection point has been detected. Addressing this vulnerability is crucial to maintain data integrity and secure hospital management operations.

The vulnerability is located in the \hms\user-login.php file of the PHPGurukul Hospital Management System, specifically in version 4.0. The endpoint affected is vulnerable to SQL Injection due to improper input validation. Attackers can inject SQL code into the username field in the login form. This can be demonstrated with a payload that manipulates the SQL query, potentially revealing sensitive database information if successful. As the exploitation does not require authentication, all external users have the potential to attempt to leverage this weakness. Critical data retrieval or modification can result from successful exploitation.

When exploited, this SQL Injection vulnerability can lead to severe consequences such as unauthorized data retrieval, data leakage, and even complete database compromise. It could allow attackers to gain insights into database structure or extract sensitive information, posing risks to patient privacy and hospital data security. Additionally, this compromise may be a precursor to further attacks, potentially targeting other vulnerabilities in the application. Mitigating this threat is crucial to preventing breaches and maintaining trust in hospital data systems.

REFERENCES

Get started to protecting your digital assets