sharathc213 / CVE-2023-7172

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2023-7172

Overview

This project contains a vulnerable version of a Hospital Management System (HMS) that is susceptible to SQL Injection (CVE-2023-7172). SQL Injection is a critical web application vulnerability that can have severe impacts on the security and functionality of a system.

CVE Details

  • CVE ID: CVE-2023-7172
  • Vulnerability Type: SQL Injection
  • Affected Component: Admin login page
  • Vulnerable Parameter: username
  • Ventor Details: phpgurukul.com
  • Vulnerable Version: Hospital Management System 1.0

Steps to Reproduce (PoC)

Clone the Repository:

git clone https://github.com/sharathc213/CVE-2023-7172.git
cd CVE-2023-7172

Run Docker Compose:

docker-compose up -d

Access the Admin Login Page:

Open a web browser and navigate to the admin login page, typically located at http://localhost:8080/hms/admin/

Initial Login Attempt:

In the "Username" field, input the following:

admin' -- -

Fill in the "Password" field with any value (it doesn't matter in this case). POC

Attempt to Log In:

Click the "Log In" button to attempt to log in using the modified username.

Observe the Result:

If the application successfully logs you into the admin dashboard without requiring the correct password, it indicates that a SQL Injection vulnerability is likely present.

Impact of SQL Injection in a Hospital Management System

SQL Injection is a critical web application vulnerability that can have severe and wide-ranging impacts on the security and functionality of a system. Here are the key potential impacts of a successful SQL Injection attack:

  • Unauthorized Data Access
  • Data Exfiltration
  • Data Manipulation
  • Account Takeover
  • System Compromise
  • Application Disruption
  • Legal and Compliance Consequences
  • Reputation Damage
  • Financial Loss

Mitigation Recommendations

To mitigate the SQL Injection vulnerability, consider implementing the following best practices:

  • Parameterized Statements (Prepared Statements)
  • Stored Procedures
  • Input Validation
  • Whitelisting
  • Escaping User Inputs

Disclaimer

This project is intentionally vulnerable and should only be used for educational and testing purposes. Do not deploy this in a production environment.

About


Languages

Language:CSS 42.1%Language:SCSS 32.4%Language:PHP 12.2%Language:JavaScript 12.2%Language:Hack 0.9%Language:Ruby 0.1%Language:Dockerfile 0.0%Language:Batchfile 0.0%