First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'ticket_id' parameter of the routers/ticket-message.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-45343.
CVE-2023-45343 has a severity level of critical.
The affected software is Online Food Ordering Script version 1.0.
To exploit this vulnerability, an attacker needs to send unfiltered characters to the 'ticket_id' parameter of the routers/ticket-message.php resource.
Yes, you can find more information about this vulnerability at the following references: [Fluid Attacks Advisory](https://fluidattacks.com/advisories/hann) and [Project Worlds](https://projectworlds.in/).