A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access.
References
Link | Resource |
---|---|
https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 | Exploit Third Party Advisory |
Configurations
History
29 Jan 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 - Exploit, Third Party Advisory | |
First Time |
Projectworlds online Food Ordering System
Projectworlds |
|
CPE | cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:* |
24 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
CWE | CWE-89 |
23 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-23 22:15
Updated : 2025-01-29 13:52
NVD link : CVE-2024-57328
Mitre link : CVE-2024-57328
CVE.ORG link : CVE-2024-57328
JSON object : View
Products Affected
projectworlds
- online_food_ordering_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')