An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html | Exploit Third Party Advisory |
https://github.com/MobiusBinary/CVE-2021-41647 | Exploit Third Party Advisory |
https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App | Product Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html | Exploit Third Party Advisory |
https://github.com/MobiusBinary/CVE-2021-41647 | Exploit Third Party Advisory |
https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App | Product Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-10-01 15:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41647
Mitre link : CVE-2021-41647
CVE.ORG link : CVE-2021-41647
JSON object : View
Products Affected
online_food_ordering_web_app_project
- online_food_ordering_web_app
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')