First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/details-router.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45340 is a vulnerability in Online Food Ordering System v1.0 that allows multiple unauthenticated SQL injections.
CVE-2023-45340 allows attackers to execute SQL injections through the 'phone' parameter of the routers/details-router.php resource.
CVE-2023-45340 has a severity rating of 9.8, which is considered critical.
To fix CVE-2023-45340, you need to validate the characters received in the 'phone' parameter of the routers/details-router.php resource and filter them before sending them to the database.
You can find more information about CVE-2023-45340 in the following references: [Link 1](https://fluidattacks.com/advisories/hann), [Link 2](https://projectworlds.in/).