Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22296 PoC — Sourcecodester Hospital Patient Records Management System 安全漏洞

Source
Associated Vulnerability
Title:Sourcecodester Hospital Patient Records Management System 安全漏洞 (CVE-2022-22296)
Description:Sourcecodester Hospital Patient Records Management System是一个基于 Web 的应用程序,为医院提供了一个自动化平台来存储和管理其患者记录。 Sourcecodester Hospital Patient Records Management System 存在安全漏洞,该漏洞源于manage_user 端点中的 id 参数容易受到不安全权限的攻击。 只需更改其他用户的值和数据即可显示。
Description
All Details about CVE-2022-22296
Readme
# CVE-2022-22296
## All Details about CVE-2022-22296

Software: Hospital's Patient Records Management System 1.0 

Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html

Vulnerability Type: Insecure Permissions - IDOR

Affected Component: id parameter in Change User Function

Impact Escalation of Privileges: true

Attack Type: Remote

Vendor of Product: Sourcecodester

### Description: 
<hr />
Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly. The vulnerability exists in Sourcecodester Hospital's Patient Records Management System Website 1.0 via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
The URL would look like: http://localhost/hprms/admin/?page=user/manage_user&id=3 where the "id" parameter is vulnerable

Impact: This vulnerability allows an attacker to edit information that do not belong to him and remove them from the users account.
File Snapshot

[4.0K] /data/pocs/2923b6bedfeccb4bcc663d01ba2f2ce4c5083ff9 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.