Online Covid Vaccination Scheduler System 1.0 SQL Injection



Application Details

The Online Covid-19 Vaccination Scheduler system stores a list of vaccination locations, and a booking system. Users can simply select a date and time, and a location, to schedule their vaccination.


Vulnerability

Online COVID Vaccination Scheduler System is vulnerable to SQL injection.


Identification

A remote attacker could send specially crafted SQL statements to the login.php script using the 'username' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.


POST /scheduler/classes/Login.php?f=login
PAYLOAD - username=admin' AND (SELECT 7551 FROM (SELECT(SLEEP(5)))QOUn) AND 'MOUZ'='MOUZ&password=blabla AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])


Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with SQL injections.


Coverage

Idappcom has created signature 8020595 along with a traffic file.


References

Online Covid Vaccination Scheduler System 1.0 SQl Injection - Exploit Database

Online Covid Vaccination Scheduler System 1.0 SQl Injection - Packet Storm Security

CVE-2021-36621


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can share your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional