First published: Wed Oct 02 2024(Updated: )
A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "from" to be affected. But it must be assumed that parameter "to" is affected as well.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Restaurant Reservation System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9429 is classified as a critical severity vulnerability.
CVE-2024-9429 affects the Restaurant Reservation System 1.0 by allowing SQL injection through improper handling of inputs in the /filter2.php file.
Exploitation of CVE-2024-9429 can allow attackers to manipulate database queries, potentially leading to unauthorized data access.
To fix CVE-2024-9429, validate and sanitize all inputs in the /filter2.php file to prevent SQL injection.
Yes, there are known exploits that target the SQL injection vulnerability in CVE-2024-9429.