A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/update_users.php of the component Update User Page. The manipulation of the argument user_upd leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://codeastro.com/ | Product |
https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.289825 | Permissions Required VDB Entry |
https://vuldb.com/?id.289825 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.472104 | Third Party Advisory VDB Entry |
https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md | Exploit Third Party Advisory |
Configurations
History
03 Apr 2025, 16:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Codeastro
Codeastro online Food Ordering System |
|
References | () https://codeastro.com/ - Product | |
References | () https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.289825 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.289825 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.472104 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:codeastro:online_food_ordering_system:1.0:*:*:*:*:*:*:* | |
Summary |
|
31 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-31 15:15
Updated : 2025-04-03 16:29
NVD link : CVE-2024-13070
Mitre link : CVE-2024-13070
CVE.ORG link : CVE-2024-13070
JSON object : View
Products Affected
codeastro
- online_food_ordering_system