First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Online Matrimonial Project v1.0 is CVE-2023-46787.
CVE-2023-46787 has a severity level of 9.8 (Critical).
The affected software for CVE-2023-46787 is the Online Matrimonial Project v1.0.
CVE-2023-46787 is classified under CWE category 89 (SQL Injection).
To fix the SQL Injection vulnerability in the Online Matrimonial Project v1.0, you should validate and sanitize the 'username' parameter in the auth/auth.php resource to prevent unfiltered characters from being sent to the database.