Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/admin/http/whatsup_gold_sqli.md
Views: 11789
Vulnerable Application
This module exploits a SQL injection vulnerability in WhatsUp Gold < v24.0.0 (CVE-2024-6670), by changing the password of an existing user (such as of the default admin
account) to an attacker-controlled one.
Testing
The software can be obtained from the vendor.
Installation instructions are available here.
Successfully tested on
WhatsUp Gold v23.1.3 on Windows 22H2
WhatsUp Gold v23.1.2 on Windows 22H2
Verification Steps
Install and run the application
Start
msfconsole
and run the following commands:
This should update the password of the default admin
account.
Options
USERNAME
The user of which to update the password (default: admin)
PASSWORD
The new password for the user
Scenarios
Running the exploit against WhatsUp Gold v23.1.3 on Windows 22H2 should result in an output similar to the following: