First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'filename' attribute of the 'pic1' multipart parameter of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-46789.
CVE-2023-46789 has a severity level of critical.
The affected software by CVE-2023-46789 is Online Matrimonial Project v1.0.
To exploit CVE-2023-46789, an attacker can inject malicious SQL queries through the 'filename' attribute of the 'pic1' multipart parameter.
To fix CVE-2023-46789, it is recommended to validate and sanitize the input to the 'filename' attribute of the 'pic1' multipart parameter before sending it to the database.