First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering Script | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this online food ordering system is CVE-2023-45338.
The severity of vulnerability CVE-2023-45338 is critical, with a severity value of 9.8.
Vulnerability CVE-2023-45338 involves multiple unauthenticated SQL injection vulnerabilities in the 'id' parameter of the routers/add-ticket.php resource of the Online Food Ordering System v1.0.
Vulnerability CVE-2023-45338 allows attackers to inject SQL queries through the 'id' parameter, potentially compromising the system's security and enabling unauthorized access to the database.
To fix vulnerability CVE-2023-45338, it is recommended to implement proper input validation and parameterization techniques to prevent SQL injection attacks in the Online Food Ordering System v1.0.