CVE-2023-31702

SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_management_console:14.0.1400.2281:*:*:*:*:*:*:*

History

21 Nov 2024, 08:02

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html - Exploit, Third Party Advisory
References () https://github.com/sahiloj/CVE-2023-31702/blob/main/README.md - Exploit, Third Party Advisory () https://github.com/sahiloj/CVE-2023-31702/blob/main/README.md - Exploit, Third Party Advisory

Information

Published : 2023-05-17 13:15

Updated : 2024-11-21 08:02


NVD link : CVE-2023-31702

Mitre link : CVE-2023-31702

CVE.ORG link : CVE-2023-31702


JSON object : View

Products Affected

escanav

  • escan_management_console
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')