First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45334 is a vulnerability in the Online Food Ordering System v1.0 that allows multiple unauthenticated SQL injections.
The severity of CVE-2023-45334 is critical with a severity value of 9.8.
CVE-2023-45334 affects the Online Food Ordering System v1.0 by allowing unauthenticated SQL injections through the 'status' parameter of the routers/edit-orders.php resource.
To fix CVE-2023-45334 in the Online Food Ordering System v1.0, you need to validate and filter the characters received through the 'status' parameter before sending them to the database.
You can find more information about CVE-2023-45334 at the following references: [https://fluidattacks.com/advisories/hann](https://fluidattacks.com/advisories/hann) and [https://projectworlds.in/](https://projectworlds.in/).