First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-45344.
The title of this vulnerability is 'Online Food Ordering System v1.0 - Multiple Unauthenticated SQL Injections (SQLi)'.
The Online Food Ordering System v1.0 is affected by this vulnerability.
The severity of CVE-2023-45344 is critical with a CVSS score of 9.8.
To fix this vulnerability, apply the relevant patches or updates provided by Projectworlds. Additionally, ensure proper input validation is implemented in the affected routers/user-router.php resource to prevent unauthenticated SQL injections.