Advertisement






qdPM 9.2 DB Connection String and Password Exposure (Unauthenticated)

CVE Category Price Severity
CVE-2021-44630 CWE-200 $500 High
Author Risk Exploitation Type Date
Unknown Critical Remote 2021-08-14
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02954 0.68902

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021080054

Below is a copy:

qdPM 9.2 DB Connection String and Password Exposure (Unauthenticated)
# Exploit Title: qdPM 9.2 - DB Connection String and Password Exposure (Unauthenticated)
# Date: 03/08/2021
# Exploit Author: Leon Trappett (thepcn3rd)
# Vendor Homepage: https://qdpm.net/
# Software Link: https://sourceforge.net/projects/qdpm/files/latest/download
# Version: 9.2
# Tested on: Ubuntu 20.04 Apache2 Server running PHP 7.4

The password and connection string for the database are stored in a yml file. To access the yml file you can go to http://<website>/core/config/databases.yml file and download.

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.