A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://codeastro.com/ | Product |
| https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.289823 | Permissions Required VDB Entry |
| https://vuldb.com/?id.289823 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.472081 | Third Party Advisory VDB Entry |
| https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-12-31 09:15
Updated : 2025-04-03 16:29
NVD link : CVE-2024-13067
Mitre link : CVE-2024-13067
CVE.ORG link : CVE-2024-13067
JSON object : View
Products Affected
codeastro
- online_food_ordering_system
