First published: Thu Sep 28 2023(Updated: )
The 'Email' parameter of the process_login.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Movie Ticket Booking System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-44164.
The severity of CVE-2023-44164 is critical (9.8).
The affected software is Projectworlds Online Movie Ticket Booking System version 1.0.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-89.
To fix CVE-2023-44164, you should validate and sanitize the 'Email' parameter received in the process_login.php resource before sending it to the database.