| Titel | Food Ordering Website |
|---|
| Beschreibung | Vulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php
# Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php
## Software
- Software: Food Ordering Website 1.0
- Software Link: https://github.com/Sakshi2610/food_ordering_website
- Vulnerability Type: SQLi
- Attack Type: Remote
- Vendor of Product: Github
## Description
A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents.
My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| Quelle | ⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| Benutzer | error404unknown (UID 53361) |
|---|
| Einreichung | 06.09.2023 04:56 (vor 3 Jahren) |
|---|
| Moderieren | 16.09.2023 08:37 (10 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php ID SQL Injection] |
|---|
| Punkte | 18 |
|---|