Path: blob/master/documentation/modules/auxiliary/admin/http/whatsup_gold_sqli.md
24960 views
Vulnerable Application
This module exploits a SQL injection vulnerability in WhatsUp Gold < v24.0.0 (CVE-2024-6670), by changing the password of an existing user (such as of the default admin account) to an attacker-controlled one.
Testing
The software can be obtained from the vendor.
Installation instructions are available here.
Successfully tested on
- WhatsUp Gold v23.1.3 on Windows 22H2 
- WhatsUp Gold v23.1.2 on Windows 22H2 
Verification Steps
- Install and run the application 
- Start - msfconsoleand run the following commands:
This should update the password of the default admin account.
Options
USERNAME
The user of which to update the password (default: admin)
PASSWORD
The new password for the user
Scenarios
Running the exploit against WhatsUp Gold v23.1.3 on Windows 22H2 should result in an output similar to the following: