Online Food Ordering System v1.0 is vulnerable to unauthenticated SQL Injection attacks. Learn about the impact, technical details, and mitigation steps for CVE-2023-45347.
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities due to the '*_verified' parameter of the routers/user-router.php resource not validating characters received, leading to unfiltered data being sent to the database.
Understanding CVE-2023-45347
This CVE identifies multiple unauthenticated SQL injection vulnerabilities in Online Food Ordering System v1.0.
What is CVE-2023-45347?
Online Food Ordering System v1.0 is affected by multiple unauthenticated SQL Injection vulnerabilities where user input is not properly sanitized before being processed, opening the system to potential database manipulation attacks.
The Impact of CVE-2023-45347
The critical impact of these vulnerabilities allows an attacker to execute malicious SQL commands without authentication, compromising the confidentiality, integrity, and availability of the system.
Technical Details of CVE-2023-45347
The vulnerability is classified under CAPEC-66 SQL Injection, with a CVSS v3.1 base score of 9.8 (Critical).
Vulnerability Description
The vulnerability arises due to improper neutralization of special elements used in an SQL command, facilitating SQL Injection attacks on the Online Food Ordering System v1.0.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by injecting malicious SQL commands through the '*_verified' parameter of the routers/user-router.php resource.
Mitigation and Prevention
To safeguard your system from potential exploits, immediate and long-term security measures are imperative.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches released by Projectworlds Pvt. Limited to fix the SQL Injection vulnerabilities in Online Food Ordering System v1.0.