CVE-2023-45338
📋 TL;DR
Online Food Ordering System v1.0 has unauthenticated SQL injection vulnerabilities in the routers/add-ticket.php endpoint. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the entire database. All deployments of this specific software version are affected.
💻 Affected Systems
- Online Food Ordering System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution via database functions.
Likely Case
Database information disclosure, credential theft, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and database permissions, though SQL injection attempts would still be logged.
🎯 Exploit Status
SQL injection via the 'id' parameter is straightforward and requires no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://projectworlds.in/
Restart Required: No
Instructions:
1. Check vendor website for updated version. 2. If available, backup database and application files. 3. Replace vulnerable files with patched version. 4. Test functionality.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the 'id' parameter before database query
Modify routers/add-ticket.php to validate 'id' parameter as integer
Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Block external access to routers/add-ticket.php via firewall rules
- Implement database user with minimal privileges (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test routers/add-ticket.php?id=1' OR '1'='1 and observe database error or unexpected behavior
Check Version:
Check application files for version information or consult vendor documentation
Verify Fix Applied:
Test same payload and confirm proper error handling or rejection
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in application logs
- Multiple rapid requests to routers/add-ticket.php with unusual parameters
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, etc.) in URL parameters
SIEM Query:
source="web_logs" AND (url="*routers/add-ticket.php*" AND (param="*' OR*" OR param="*UNION*" OR param="*SELECT*"))