René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.5 KiB
JSON

{
"id": "CVE-2021-43630",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-22T18:15:07.813",
"lastModified": "2021-12-28T13:48:21.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server."
},
{
"lang": "es",
"value": "Projectworlds Hospital Management System versi\u00f3n v1.0 es vulnerable a una inyecci\u00f3n SQL por medio de m\u00faltiples par\u00e1metros en el archivo add_patient.php. Como resultado, un usuario malicioso autenticado puede comprometer el sistema de bases de datos y, en algunos casos, aprovechar esta vulnerabilidad para conseguir una ejecuci\u00f3n de c\u00f3digo remota en el servidor web remoto"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}