A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.223300 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.223300 | Permissions Required Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-03-17 07:15
Updated : 2024-05-17 02:18
NVD link : CVE-2023-1455
Mitre link : CVE-2023-1455
CVE.ORG link : CVE-2023-1455
JSON object : View
Products Affected
online_pizza_ordering_system_project
- online_pizza_ordering_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')