CVE-2023-45336
📋 TL;DR
Online Food Ordering System v1.0 has unauthenticated SQL injection vulnerabilities in the routers/router.php resource, allowing attackers to execute arbitrary SQL commands without authentication. This affects all deployments of this specific software version.
💻 Affected Systems
- Online Food Ordering System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution via database functions.
Likely Case
Database information disclosure, credential theft, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permission restrictions.
🎯 Exploit Status
SQL injection is well-understood with many automated tools available. The unauthenticated nature makes exploitation trivial.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://projectworlds.in/
Restart Required: No
Instructions:
1. Check vendor website for updates. 2. If no patch available, implement parameterized queries in routers/router.php. 3. Add input validation for the password parameter.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting the routers/router.php endpoint.
Input Validation Filter
allAdd server-side validation to reject SQL special characters in the password parameter.
🧯 If You Can't Patch
- Isolate the system from internet access and restrict to internal network only.
- Implement strict database permissions limiting application user to only necessary operations.
🔍 How to Verify
Check if Vulnerable:
Test routers/router.php with SQL injection payloads in the password parameter (e.g., ' OR '1'='1).
Check Version:
Check software version in admin panel or configuration files.
Verify Fix Applied:
Verify that SQL injection payloads no longer work and that parameterized queries are implemented.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed login attempts with SQL patterns
Network Indicators:
- HTTP requests to routers/router.php with SQL keywords in parameters
SIEM Query:
source="web_logs" AND uri="/routers/router.php" AND (param="password" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|or|and)")