First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45336 is critical, with a CVSS v3 score of 9.8.
CVE-2023-45336 refers to multiple unauthenticated SQL injection vulnerabilities in the Online Food Ordering System v1.0.
CVE-2023-45336 allows attackers to execute arbitrary SQL queries on the Online Food Ordering System v1.0 database without authentication.
To fix CVE-2023-45336, it is recommended to validate and sanitize user input for the 'password' parameter in the routers/router.php resource to prevent SQL injection attacks.
You can find more information about CVE-2023-45336 at the following references: [Fluid Attacks Advisory](https://fluidattacks.com/advisories/hann) and [Project Worlds](https://projectworlds.in/).