CVE-2023-45346
📋 TL;DR
Online Food Ordering System v1.0 contains unauthenticated SQL injection vulnerabilities in the routers/user-router.php resource. Attackers can execute arbitrary SQL commands without authentication, potentially compromising the entire database. All systems running this specific version are affected.
💻 Affected Systems
- Online Food Ordering System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, and potential remote code execution via database functions.
Likely Case
Database information disclosure, authentication bypass, and privilege escalation leading to unauthorized access to sensitive customer and business data.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure.
🎯 Exploit Status
SQL injection is well-understood with many automated tools available. The unauthenticated nature makes exploitation trivial.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://projectworlds.in/
Restart Required: No
Instructions:
1. Check vendor website for updated version. 2. If available, backup database and application files. 3. Replace vulnerable files with patched version. 4. Test functionality.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to filter malicious characters in the *_role parameter
Edit routers/user-router.php to add parameter validation
Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Implement network segmentation to isolate the vulnerable system
- Deploy database monitoring and alerting for suspicious SQL queries
🔍 How to Verify
Check if Vulnerable:
Test the routers/user-router.php endpoint with SQL injection payloads in the *_role parameter
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Verify input validation is implemented and test with SQL injection payloads that should be rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts from single IP
- Database queries with unusual patterns
Network Indicators:
- HTTP requests containing SQL keywords to vulnerable endpoint
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND (uri="/routers/user-router.php" AND (query="*_role=*" OR query CONTAINS "SELECT" OR query CONTAINS "UNION"))