An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html | Exploit Third Party Advisory |
https://github.com/MobiusBinary/CVE-2021-41647 | Exploit Third Party Advisory |
https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App | Product Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html | Exploit Third Party Advisory |
https://github.com/MobiusBinary/CVE-2021-41647 | Exploit Third Party Advisory |
https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App | Product Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html - Exploit, Third Party Advisory | |
References | () https://github.com/MobiusBinary/CVE-2021-41647 - Exploit, Third Party Advisory | |
References | () https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App - Product, Third Party Advisory | |
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 - Exploit, Third Party Advisory |
08 Oct 2021, 15:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
CPE | cpe:2.3:a:online_food_ordering_web_app_project:online_food_ordering_web_app:1.0:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/MobiusBinary/CVE-2021-41647 - Exploit, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App - Product, Third Party Advisory |
07 Oct 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Oct 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Oct 2021, 15:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-01 15:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41647
Mitre link : CVE-2021-41647
CVE.ORG link : CVE-2021-41647
JSON object : View
Products Affected
online_food_ordering_web_app_project
- online_food_ordering_web_app
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')