CVE-2023-48433

Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the login_action.php resource does not validate the characters received and they are sent unfiltered to the database.
References
Link Resource
https://fluidattacks.com/advisories/ma/ Third Party Advisory
https://projectworlds.in/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:online_voting_system_project:1.0:*:*:*:*:*:*:*

History

22 Dec 2023, 20:26

Type Values Removed Values Added
First Time Projectworlds online Voting System Project
Projectworlds
References () https://fluidattacks.com/advisories/ma/ - () https://fluidattacks.com/advisories/ma/ - Third Party Advisory
References () https://projectworlds.in/ - () https://projectworlds.in/ - Product
CPE cpe:2.3:a:projectworlds:online_voting_system_project:1.0:*:*:*:*:*:*:*

21 Dec 2023, 02:24

Type Values Removed Values Added
Summary
  • (es) Online Voting System Project v1.0 es afectado por múltiples vulnerabilidades de inyección SQL no autenticada. El parámetro 'username' del recurso login_action.php no valida los caracteres recibidos y se envían sin filtrar a la base de datos.

20 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-20 21:15

Updated : 2023-12-22 20:26


NVD link : CVE-2023-48433

Mitre link : CVE-2023-48433

CVE.ORG link : CVE-2023-48433


JSON object : View

Products Affected

projectworlds

  • online_voting_system_project
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')