First published: Thu Sep 28 2023(Updated: )
The 'bookisbn' parameter of the cart.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Book Store Project | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43739 is critical with a score of 9.8.
The affected software of CVE-2023-43739 is Online Book Store Project version 1.0.
CVE-2023-43739 allows for unvalidated characters to be sent to the database, posing a threat to the system's security.
Yes, you can find references for CVE-2023-43739 at the following URLs: [fluidattacks.com](https://fluidattacks.com/advisories/filth) and [projectworlds.in](https://projectworlds.in/).
To fix CVE-2023-43739, validate the characters received through the 'bookisbn' parameter before sending them to the database.