Required CVE Record Information
Description
A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/ajax.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222872.
CVSS 3 Total
Score | Severity | Version | Vector String |
---|---|---|---|
7.3 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.3 | HIGH | 3.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.5 | — | 2.0 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) analyst
References 3 Total
- https://vuldb.com/?id.222872 vdb-entrytechnical-description
- https://vuldb.com/?ctiid.222872 signaturepermissions-required
- https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf exploit
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 3 Total
- https://vuldb.com/?id.222872 vdb-entrytechnical-descriptionx_transferred
- https://vuldb.com/?ctiid.222872 signaturepermissions-requiredx_transferred
- https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf exploitx_transferred