vendor:
Simple Online Food Ordering System
by:
Eren 'Aporlorxl23' Şimşek
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple Online Food Ordering System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:simple_online_food_ordering_system_using_php:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux - XAMPP Server
2020
Simple Online Food Ordering System 1.0 – ‘id’ SQL Injection (Unauthenticated)
A vulnerability exists in Simple Online Food Ordering System 1.0, where an unauthenticated user can inject malicious SQL code into the 'id' parameter of the 'view_prod.php' page, allowing them to access and modify data in the database. The vulnerable code is located in the 'view_prod.php' page, where the 'id' parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL code in the 'id' parameter.
Mitigation:
The vendor should ensure that the 'id' parameter is properly sanitized before being used in a SQL query.