CVE-2023-1300SQL Injection in Covid 19 Testing Management System

Severity
9.8CRITICALNVD
CNA6.3
EPSS
0.3%
top 47.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 9
Latest updateMay 21

Description

A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

🔴Vulnerability Details

2
GHSA
GHSA-rw4m-j3pj-9r22: A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 12023-03-10
CVEList
SourceCodester COVID 19 Testing Management System POST Parameter patient-report.php sql injection2023-03-09

📋Vendor Advisories

3
Red Hat
kernel: xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()2024-05-21
Red Hat
kernel: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround2024-02-29
Red Hat
gnutls: timing side-channel in the TLS RSA key exchange code2023-02-14
CVE-2023-1300 — SQL Injection | cvebase