Gửi #380816: For IP Tecnologia Ltda monitcallcenter 1.x SQL Injectionthông tin

tiêu đềFor IP Tecnologia Ltda monitcallcenter 1.x SQL Injection
Mô tảA SQL injection vulnerability was found in the "user" parameter sent to the application through a JSON file. Due to the lack of server-side sanitization, it is possible to inject the payload ' OR 1=1 -- , granting access to the administrative system of VOIP calls. Through the graphical interface, authenticated in the system, it is possible to download and listen to the calls saved in the call center management system's database. Through Google, it is possible to find some exposed systems containing the vulnerability. These systems include: http://x.x.x.x:84/ and http://x.x.x.x:84/. To find them, as I had previously reported other vulnerabilities in the "ForIP Tecnologia - Administração PABX" system, I simply searched on Google for "forip tecnologia administração pabx" and changed the port from 8443 (where I found and registered the vulnerability with vuldb as CVE-2024-7101) to port 84, making access to the "monitcallcenter" system possible.
Nguồn⚠️ https://docs.google.com/document/d/1mlEC73Tdqr8L39ogilAbWSj4ZvCRmprtI82zvawWCzE/edit?usp=sharing
Người dùng
 gabriel (UID 72007)
Đệ trình26/07/2024 21:26 (cách đây 2 những năm)
Kiểm duyệt04/08/2024 08:26 (8 days later)
Trạng tháiđược chấp nhận
Mục VulDB273554 [ForIP Tecnologia Administração PABX 1.x monitcallcenter /authMonitCallcenter Người dùng Tiêm SQL]
điểm20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!