Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter in the 'uploadphoto()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50955 | Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter in the 'uploadphoto()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fluidattacks.com/advisories/ros |
|
| https://projectworlds.in |
|
History
No history.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-09-17T13:06:16.599Z
Reserved: 2023-10-26T13:15:10.531Z
Link: CVE-2023-46788
Updated: 2024-08-02T20:53:21.695Z
Status : Modified
Published: 2023-11-07T21:15:13.607
Modified: 2024-11-21T08:29:19.423
Link: CVE-2023-46788
No data.
OpenCVE Enrichment
No data.
EUVD