A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System. This affects an unknown part of the file router.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-209583.
References
Link | Resource |
---|---|
https://github.com/vuls/vuls/blob/main/Food%20Ordering%20Management%20System%20router.php%20SQL%20Injection.pdf | Exploit Third Party Advisory |
https://vuldb.com/?id.209583 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
Information
Published : 2022-09-28 05:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-3332
Mitre link : CVE-2022-3332
CVE.ORG link : CVE-2022-3332
JSON object : View
Products Affected
food_ordering_management_system_project
- food_ordering_management_system
CWE
CWE-707
Improper Neutralization