Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31101 PoC — Prestashop SQL注入漏洞

Source
Associated Vulnerability
Title:Prestashop SQL注入漏洞 (CVE-2022-31101)
Description:Prestashop是美国Prestashop公司的一套开源的电子商务解决方案。该方案提供多种支付方式、短消息提醒和商品图片缩放等功能。 Prestashop 存在SQL注入漏洞,该漏洞源于经过身份验证的客户可以执行 SQL 注入。
Description
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
Readme
# CVE-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)


## Usage
- `python3 cve-2022-31101.py`
- Give the url to the wishlist when prompted. Example of a url: `http://example.com/module/blockwishlist/view?id_wishlist=1`
- Give the cookies for your account when prompted.
- Now it will start attacking the website.

## In action
![cve-2022-31101](https://user-images.githubusercontent.com/59091280/183629068-cbd9ffad-c3cf-4a5e-9571-5d8d5becbe3d.png)

### Note
This exploit assumes the prefix for the table names in the database to be `ps_`. It is the default prefix given by PrestaShop.
File Snapshot

[4.0K] /data/pocs/a55c591f5eba9c6d62973a0231f0e776761174a3 ├── [8.8K] cve-2022-31101.py └── [ 620] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.