Online Voting System Project v1.0 - SQLi
9.8
Critical
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Online Voting System Project v1.0 - Multiple Unauthenticated SQL Injections (SQLi)
Code name
State
Public
Release date
Dec 7, 2023
Affected product
Online Voting System Project
Vendor
Projectworlds Pvt. Limited
Affected version(s)
Version 1.0
Vulnerability name
Unauthenticated SQL Injections (SQLi)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.0 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 base score
9.8
Exploit available
Yes
CVE ID(s)
Description
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.
Vulnerabilities
CVE-2023-48433
The 'username' parameter of the login_action.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
CVE-2023-48434
The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database. The vulnerable code is:
Our security policy
We have reserved the IDs CVE-2023-48433 and CVE-2023-48434 to refer to these issues from now on.
System Information
Version: Online Voting System Project v1.0
Operating System: Any
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://projectworlds.in/
Timeline
Vulnerability discovered
Nov 16, 2023
Vendor contacted
Nov 16, 2023
Public disclosure
Dec 7, 2023