Skip to main content

CVE-2024-0362: CWE-89 SQL Injection in PHPGurukul Hospital Management System

Medium
VulnerabilityCVE-2024-0362cvecve-2024-0362cwe-89
Published: Wed Jan 10 2024 (01/10/2024, 02:00:06 UTC)
Source: CVE
Vendor/Project: PHPGurukul
Product: Hospital Management System

Description

A vulnerability classified as critical was found in PHPGurukul Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/change-password.php. The manipulation of the argument cpass leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-250129 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:25:35 UTC

Technical Analysis

CVE-2024-0362 is a SQL Injection vulnerability identified in version 1.0 of the PHPGurukul Hospital Management System, specifically in the admin/change-password.php file. The vulnerability arises from improper sanitization or validation of the 'cpass' parameter, which is used in SQL queries. An attacker with at least low privileges (PR:L) and network access (AV:A) can manipulate this parameter to inject malicious SQL code. This can lead to unauthorized disclosure of data (confidentiality impact), modification of data (integrity impact), and potential disruption of service (availability impact). The vulnerability does not require user interaction (UI:N) and affects the same security scope (S:U). Although the CVSS score is 5.5 (medium severity), the vulnerability is critical in nature due to the potential for data compromise in a healthcare environment. No public exploits are currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of available patches means that affected systems remain vulnerable until mitigations or updates are applied.

Potential Impact

For European healthcare organizations using PHPGurukul Hospital Management System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive patient data, violating GDPR regulations and potentially resulting in heavy fines and reputational damage. Data integrity could be compromised, affecting patient treatment records and hospital operations. Availability impacts could disrupt hospital services, causing delays in patient care. Given the critical nature of healthcare data and the strict regulatory environment in Europe, this vulnerability could have severe operational and legal consequences. Additionally, the medium CVSS score may underestimate the real-world impact in this sector, where data confidentiality and integrity are paramount.

Mitigation Recommendations

European organizations should immediately audit their use of PHPGurukul Hospital Management System 1.0 and identify any instances of the vulnerable software. Since no official patches are available, organizations should implement the following mitigations: 1) Apply input validation and parameterized queries or prepared statements in the admin/change-password.php script to prevent SQL injection. 2) Restrict access to the admin interface to trusted networks and users only, using network segmentation and VPNs. 3) Monitor database logs and application logs for suspicious queries or unusual activity related to the 'cpass' parameter. 4) Employ Web Application Firewalls (WAFs) with rules targeting SQL injection attempts on the affected endpoint. 5) Conduct regular security assessments and penetration testing focused on injection vulnerabilities. 6) Plan for an upgrade or migration to a patched or alternative hospital management system as soon as a fix becomes available or if the vendor discontinues support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-09T15:06:20.207Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd74f3

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:25:35 AM

Last updated: 8/10/2025, 11:46:36 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats