| Titre | Food Ordering Website |
|---|
| Description | Vulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php
# Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php
## Software
- Software: Food Ordering Website 1.0
- Software Link: https://github.com/Sakshi2610/food_ordering_website
- Vulnerability Type: SQLi
- Attack Type: Remote
- Vendor of Product: Github
## Description
A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents.
My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| La source | ⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| Utilisateur | error404unknown (UID 53361) |
|---|
| Soumission | 06/09/2023 04:56 (il y a 3 ans) |
|---|
| Modérer | 16/09/2023 08:37 (10 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php ID injection SQL] |
|---|
| Points | 18 |
|---|