9.1
CVSSv3

CVE-2021-41647

Published: 01/10/2021 Updated: 08/10/2021
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

online food ordering web app project online food ordering web app 1.0

Exploits

Online-Food-Ordering-Web-App suffers from a remote SQL injection vulnerability that allows for authentication bypass ...

Github Repositories

CVE-2021-41647 CVE-2021-41647 SQL Injection in Online-Food-Ordering-Web-App The Online-Food-Ordering-Web-App is vulnerable to un-authenticated error and time-based blind SQL Injection attacks The username parameter on the /loginphp page does not sanitize the user input, an attacker is able to bypass the login using a simple bypass technique Link To Application Online-Food-Or