First published: Fri Aug 18 2023(Updated: )
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Online Shopping Portal Project Online Shopping Portal | =3.1 | |
PHPGurukul Online Shopping Portal | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-38890.
The severity level of CVE-2023-38890 is high with a score of 8.8.
CVE-2023-38890 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation in the Online Shopping Portal Project 3.1.
To mitigate CVE-2023-38890, it is recommended to implement proper input validation in the username field and sanitize user-supplied input to prevent SQL injection attacks.
Yes, you can find more information about CVE-2023-38890 at the following reference link: [GitHub - akshadjoshi/CVE-2023-38890](https://github.com/akshadjoshi/CVE-2023-38890)