First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'verified' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45333 is critical with a CVSS score of 9.8.
CVE-2023-45333 is a vulnerability that allows multiple unauthenticated SQL Injection attacks in the Online Food Ordering System v1.0.
CVE-2023-45333 allows attackers to perform unauthenticated SQL injections in the Online Food Ordering System v1.0.
To fix CVE-2023-45333, it is recommended to validate input characters and filter them properly before sending them to the database.
More information about CVE-2023-45333 can be found at the following references: [Fluid Attacks Advisory](https://fluidattacks.com/advisories/hann) and [Projectworlds](https://projectworlds.in/).