Vulnerability Description
A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222003.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Online Catering Reservation System Project | Online Catering Reservation System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/jackswordsz/bug_report/blob/main/vendors/emoblazz/Online%20CaExploitThird Party Advisory
- https://vuldb.com/?ctiid.222003Third Party Advisory
- https://vuldb.com/?id.222003Third Party Advisory
- https://github.com/jackswordsz/bug_report/blob/main/vendors/emoblazz/Online%20CaExploitThird Party Advisory
- https://vuldb.com/?ctiid.222003Third Party Advisory
- https://vuldb.com/?id.222003Third Party Advisory
FAQ
What is CVE-2023-1100?
CVE-2023-1100 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component P...
How severe is CVE-2023-1100?
CVE-2023-1100 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1100?
Check the references section above for vendor advisories and patch information. Affected products include: Online Catering Reservation System Project Online Catering Reservation System.