First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'name' parameter of the routers/add-item.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Online Food Ordering System vulnerability is CVE-2023-45323.
The severity of CVE-2023-45323 is critical with a severity value of 9.8.
The vulnerability in Online Food Ordering System occurs due to multiple Unauthenticated SQL Injection vulnerabilities in the 'name' parameter of the routers/add-item.php resource.
The Online Food Ordering System v1.0 is affected by the vulnerability.
To fix the vulnerability in Online Food Ordering System, you need to validate and filter the characters received in the 'name' parameter of the routers/add-item.php resource before sending them to the database.