First published: Tue Nov 07 2023(Updated: )
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-46793.
CVE-2023-46793 has a severity of critical.
Online Matrimonial Project v1.0 is affected by CVE-2023-46793.
CVE-2023-46793 allows an attacker to perform multiple unauthenticated SQL injections by manipulating the 'day' parameter in the 'register()' function.
To fix CVE-2023-46793, the developers should validate and filter the characters received in the 'day' parameter before sending them to the database.