CVE-2024-57328

A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access.
References
Link Resource
https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:*

History

29 Jan 2025, 13:52

Type Values Removed Values Added
References () https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 - () https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 - Exploit, Third Party Advisory
First Time Projectworlds online Food Ordering System
Projectworlds
CPE cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:*

24 Jan 2025, 22:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Existe una vulnerabilidad de inyección SQL en el formulario de inicio de sesión de Online Food Ordering System v1.0. La vulnerabilidad surge porque los campos de entrada de nombre de usuario y contraseña no están correctamente desinfectados, lo que permite a los atacantes inyectar consultas SQL maliciosas para eludir la autenticación y obtener acceso no autorizado.
CWE CWE-89

23 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-23 22:15

Updated : 2025-01-29 13:52


NVD link : CVE-2024-57328

Mitre link : CVE-2024-57328

CVE.ORG link : CVE-2024-57328


JSON object : View

Products Affected

projectworlds

  • online_food_ordering_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')