Vulnerability Description
SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Escanav | Escan Management Console | 14.0.1400.2281 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2ExploitThird Party Advisory
- https://github.com/sahiloj/CVE-2023-31702/blob/main/README.mdExploitThird Party Advisory
- http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2ExploitThird Party Advisory
- https://github.com/sahiloj/CVE-2023-31702/blob/main/README.mdExploitThird Party Advisory
FAQ
What is CVE-2023-31702?
CVE-2023-31702 is a vulnerability with a CVSS score of 7.2 (HIGH). SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution ...
How severe is CVE-2023-31702?
CVE-2023-31702 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-31702?
Check the references section above for vendor advisories and patch information. Affected products include: Escanav Escan Management Console.