| タイトル | Food Ordering Website |
|---|
| 説明 | Vulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php
# Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php
## Software
- Software: Food Ordering Website 1.0
- Software Link: https://github.com/Sakshi2610/food_ordering_website
- Vulnerability Type: SQLi
- Attack Type: Remote
- Vendor of Product: Github
## Description
A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents.
My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| ソース | ⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| ユーザー | error404unknown (UID 53361) |
|---|
| 送信 | 2023年09月06日 04:56 (3 年 ago) |
|---|
| モデレーション | 2023年09月16日 08:37 (10 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php 識別子 SQLインジェクション] |
|---|
| ポイント | 18 |
|---|