Description
A vulnerability was identified in sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8. Affected by this vulnerability is the function findOrderHosNum of the file /ssm_pro/orderHos/. Such manipulation of the argument hospitalAddress/hospitalName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-01-04: | Advisory disclosed |
| 2026-01-04: | VulDB entry created |
| 2026-01-05: | VulDB entry last update |
Credits
mukyuuhate (VulDB User)
References
vuldb.com/?id.339483 (VDB-339483 | sfturing hosp_order orderHos findOrderHosNum sql injection)
vuldb.com/?ctiid.339483 (VDB-339483 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.722925 (Submit #722925 | https://github.com/sfturing/hosp_order hosp_order latest SQL Injection)
github.com/sfturing/hosp_order/issues/111
github.com/sfturing/hosp_order/issues/111
github.com/sfturing/hosp_order/