An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
References
Link | Resource |
---|---|
https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App | Product Third Party Advisory |
https://github.com/MobiusBinary/CVE-2021-41647 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html | Exploit Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-10-01 08:15
Updated : 2021-10-08 08:19
NVD link : CVE-2021-41647
Mitre link : CVE-2021-41647
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
online_food_ordering_web_app_project
- online_food_ordering_web_app