| Título | Food Ordering Website |
|---|
| Descrição | Vulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php
# Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php
## Software
- Software: Food Ordering Website 1.0
- Software Link: https://github.com/Sakshi2610/food_ordering_website
- Vulnerability Type: SQLi
- Attack Type: Remote
- Vendor of Product: Github
## Description
A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents.
My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| Fonte | ⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md |
|---|
| Utilizador | error404unknown (UID 53361) |
|---|
| Submissão | 06/09/2023 04h56 (há 3 anos) |
|---|
| Moderação | 16/09/2023 08h37 (10 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php ID Injeção SQL] |
|---|
| Pontos | 18 |
|---|