Attacker Value
Very High
(1 user assessed)
Exploitability
Very High
(1 user assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
1

Online-Catering-Reservation-DT Food Catering (by: oretnom23 ) v1.0 SQL injection - login

Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Credential Access
Techniques
Validation
Validated
Validated
Execution
Techniques
Validation
Validated
Validated

Description

The Online-Catering-Reservation-DT Food-Catering(by: oretnom23)v1.0 is vulnerable
in the application /catering/classes/Login.php which is redirected from /catering/dist/js/script.js app.
The SQL injection can be deployed by using the username vulnerable parameter on /catering/admin/login.php.
The parameter is not protected correctly, and there is no security escaping correctly to the MySQL query on /catering/classes/Login.php
when the user is sending fake information or malicious query payload to the database.

Add Assessment

1
Ratings
Technical Analysis

Description:

The Online-Catering-Reservation-DT Food-Catering(by: oretnom23)v1.0 is vulnerable
in the application /catering/classes/Login.php which is called from /catering/dist/js/script.js app.
The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads.
When the user is sending a request to the MySQL server he can bypass the login credentials and take control of the administer account.

More:

https://www.nu11secur1ty.com/2021/08/online-catering-reservation-dt-sql.html

More:

https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering

Simple proof and simple fix but not strong! =)

https://streamable.com/7qfnkl

BR

General Information

Technical Analysis