Security
Headlines
HeadlinesLatestCVEs

Headline

eScan Management Console 14.0.1400.2281 SQL Injection

eScan Management Console version 14.0.1400.2281 suffers from a remote SQL injection vulnerability.

Packet Storm
#sql#vulnerability#windows#auth
# Exploit Title: eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)# Date: 16/05/2023# Exploit Author: Sahil Ojha# Vendor Homepage: https://www.escanav.com# Software Link: https://cl.escanav.com/ewconsole.dll# Version: 14.0.1400.2281# Tested on: Windows# CVE : CVE-2023-31702*Step of Reproduction/Proof of concept(POC)*1. Login into the escan management console with a valid username andpassword as root user.2. Navigate to URL:https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1&cnt=41763. Inject the payload into the UsrId parameter to confirm the SQLinjection as shown below:https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1;WAITFORDELAY '0:0:5'--&cnt=41764. The time delay of 5 seconds confirmed that "UsrId" parameter wasvulnerable to SQL Injection. Furthermore, it was also possible to dumpall the databases and inject OS shell directly into the MS SQL Serverusing SQLMap tool.

Related news

CVE-2023-31702: CVE-2023-31702/README.md at main · sahiloj/CVE-2023-31702

SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution