Files
CVEs-PoC/2018/CVE-2018-8820.md
T
2024-06-18 02:51:15 +02:00

20 lines
940 B
Markdown

### [CVE-2018-8820](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8820)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2018/Mar/57
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/hateshape/frevvomapexec
- https://github.com/hectorgie/PoC-in-GitHub