Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8820 PoC — Square 9 GlobalForms SQL注入漏洞

Source
Associated Vulnerability
Title:Square 9 GlobalForms SQL注入漏洞 (CVE-2018-8820)
Description:Square 9 GlobalForms是美国Square 9 Softworks公司的一套Web表单管理软件。该软件能够收集Web表单数据并根据关键字自动填充数据。 Square 9 GlobalForms 6.2.x版本中的‘match’参数存在SQL注入漏洞。远程攻击者可利用该漏洞执行任意SQL命令。
Description
 PoC Exploit for CVE-2018-8820
Readme
![Supported Python versions](https://img.shields.io/badge/python-2.7-blue.svg)
# frevvomapexec
frevvomapexec is a script to verify the existence of a blind SQL injection vulnerability by injecting a delay of your choosing in seconds in Square 9 GlobalForms 6.2. To verify the vulnerability is legitimate, the end user will be required to do math (e.g. Subtracting the smaller number from the bigger number in seconds). If that math value aligns approximately with the parameter specified with (-s) you are the proud new owner of a SQL injection. Also, use SQLmap. It is your friend. Also, remember this is an authenticated SQL injection! But do not dispair oftentimes the server will still have default credentials enabled! By default freevomapexec uses the default credentials so oftentimes all is well!

## Usage ##
Usage: frevvomapexec.py [-h] -t TARGET -s SECONDS -o PORT [-u] [-p]

        Proof of Concept script for validation of CVE-2018-8820.
         - Type of issue: Authenticated Blind SQL injection
         - Product: Square 9 GlobalForms
         - Version: v6.2.x

##### Required: ##### 
    -t TARGET, --target TARGET        Target URL or IP Address
    -s SECONDS, --seconds SECONDS     Number of seconds to pause Frevvo
    -o PORT, --port PORT              Frevvo Web Server Port
  
##### Optional Arguments: #####
    -h, --help            show this help message and exit
    -u, --username        Login Username
    -p, --password        Login Password

File Snapshot

[4.0K] /data/pocs/3d9e6b470624af0e8a9f4246d3caf36f9dd59c6e ├── [1.9K] frevvomapexec.py ├── [ 257] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.