CVE-2025-3179
📋 TL;DR
A critical SQL injection vulnerability exists in the Online Doctor Appointment Booking System 1.0, specifically in the /doctor/deletepatient.php file's 'ic' parameter. This allows remote attackers to execute arbitrary SQL commands on the database. All users running version 1.0 of this software are affected.
💻 Affected Systems
- projectworlds Online Doctor Appointment Booking System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via database functions.
Likely Case
Unauthorized access to sensitive patient and appointment data, including personal health information and medical records.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing data viewing but not modification.
🎯 Exploit Status
Exploit details are publicly available on GitHub; SQL injection is a well-understood attack vector with many automated tools available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider implementing input validation and parameterized queries in the affected file, or replace with a secure alternative system.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allImplement WAF rules to block SQL injection patterns targeting the /doctor/deletepatient.php endpoint.
WAF-specific configuration required
Input Validation Filter
allAdd input validation to sanitize the 'ic' parameter before processing.
Modify deletepatient.php to validate/sanitize the ic parameter
🧯 If You Can't Patch
- Isolate the system from internet access and restrict to internal network only
- Implement strict network segmentation and monitor all database queries from the application
🔍 How to Verify
Check if Vulnerable:
Check if /doctor/deletepatient.php exists and accepts 'ic' parameter; test with SQL injection payloads like ' OR '1'='1
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Test the same SQL injection payloads after modifications; they should be rejected or sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts or parameter manipulation in web logs
- Requests to /doctor/deletepatient.php with suspicious 'ic' parameter values
Network Indicators:
- SQL error messages in HTTP responses
- Unusual database connection patterns from web server
SIEM Query:
web.url:"/doctor/deletepatient.php" AND (web.param.ic:("OR" OR "UNION" OR "SELECT" OR "--"))