Skip to main content

CVE-2023-1059: SQL Injection in SourceCodester Doctors Appointment System

Medium
VulnerabilityCVE-2023-1059cvecve-2023-1059
Published: Mon Feb 27 2023 (02/27/2023, 11:08:27 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Doctors Appointment System

Description

A vulnerability classified as critical was found in SourceCodester Doctors Appointment System 1.0. This vulnerability affects unknown code of the file /admin/doctors.php of the component Parameter Handler. The manipulation of the argument search/id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:12:29 UTC

Technical Analysis

CVE-2023-1059 is a medium-severity SQL Injection vulnerability identified in SourceCodester Doctors Appointment System version 1.0. The flaw exists in the /admin/doctors.php file within the Parameter Handler component, specifically through manipulation of the 'search' or 'id' parameters. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction, by injecting malicious SQL code into these parameters. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive patient and appointment data or allowing further compromise of the system. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a network attack vector with low complexity and no privileges required, but with limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability disclosure means that attackers could develop exploits, increasing the risk over time. The lack of an official patch or mitigation from the vendor at this time further elevates the threat to users of this system. Given the critical nature of healthcare data, exploitation could have serious consequences for patient privacy and healthcare operations.

Potential Impact

For European organizations using the SourceCodester Doctors Appointment System 1.0, this vulnerability poses a risk of unauthorized data access and potential data breaches involving sensitive patient information. Exploitation could lead to exposure of personal health information (PHI), violating GDPR requirements and resulting in significant regulatory penalties and reputational damage. Additionally, attackers could manipulate appointment data, disrupting healthcare service delivery and patient care coordination. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, especially in healthcare environments with limited cybersecurity resources. The medium CVSS score suggests moderate impact, but the criticality of healthcare data amplifies the consequences. Organizations may also face operational disruptions if attackers leverage the vulnerability to escalate privileges or deploy further attacks within their networks.

Mitigation Recommendations

Organizations should immediately audit their use of the SourceCodester Doctors Appointment System and identify any instances of version 1.0 in their environment. Since no official patch is currently available, mitigation should focus on implementing strict input validation and sanitization on the 'search' and 'id' parameters within the /admin/doctors.php component to prevent SQL injection. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting these parameters can provide an additional layer of defense. Restricting access to the administration interface to trusted IP addresses and enforcing strong authentication mechanisms can reduce exposure. Regularly monitoring logs for suspicious query patterns and anomalous database activity is critical for early detection. Organizations should also plan to upgrade to a patched or more secure version of the software once available or consider alternative appointment management solutions with stronger security postures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-02-27T11:06:59.761Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb896

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 3:12:29 PM

Last updated: 8/13/2025, 12:49:07 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats