First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Matrimonial Project | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Online Matrimonial Project v1.0 vulnerability is CVE-2023-46786.
The severity of vulnerability CVE-2023-46786 is critical with a severity value of 9.8.
The Online Matrimonial Project v1.0 vulnerability occurs due to multiple unauthenticated SQL Injection vulnerabilities in the 'password' parameter of the auth/auth.php resource.
The affected software of vulnerability CVE-2023-46786 is Online Matrimonial Project v1.0.
To fix vulnerability CVE-2023-46786 in Online Matrimonial Project v1.0, implement proper validation for the 'password' parameter in the auth/auth.php resource to prevent unauthenticated SQL injections.