First published: Thu Nov 02 2023(Updated: )
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Food Ordering Script | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this online food ordering system is CVE-2023-45345.
The severity level of CVE-2023-45345 is critical with a score of 9.8.
This vulnerability allows for multiple Unauthenticated SQL Injection attacks on the system which can lead to unauthorized access and manipulation of the database.
The affected software version of this vulnerability is Online Food Ordering System v1.0.
To fix CVE-2023-45345, it is recommended to sanitize and validate user input in the routers/user-router.php resource.