misc update
parent
1986e1211d
commit
2fa9791bdc
|
@ -4,17 +4,17 @@ info:
|
|||
name: BillQuick Web Suite SQLi
|
||||
author: dwisiswant0
|
||||
severity: high
|
||||
tags: bqe,cve,cve2021,sqli
|
||||
tags: cve,cve2021,sqli,billquick
|
||||
description: |
|
||||
This template supports the detection part only. See references.
|
||||
|
||||
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1
|
||||
allows SQL injection for unauthenticated remote code execution,
|
||||
as exploited in the wild in October 2021 for ransomware installation.
|
||||
SQL injection can, for example, use the txtID (aka username) parameter.
|
||||
Successful exploitation can include the ability to execute
|
||||
arbitrary code as MSSQLSERVER$ via xp_cmdshell.
|
||||
reference: https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware
|
||||
reference:
|
||||
- https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-42258
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
Loading…
Reference in New Issue