module

BillQuick Web Suite txtID SQLi

Disclosed
Oct 22, 2021
Created
Nov 12, 2021

Description

This module exploits a SQL injection vulnerability in BillQUick Web Suite prior to version 22.0.9.1.
The application is .net based, and the database is required to be MSSQL. Luckily the website gives
error based SQLi messages, so it is trivial to pull data from the database. However the webapp
uses an unknown password security algorithm. This vulnerability does not seem to support stacked
queries.
This module pulls the database name, banner, user, hostname, and the SecurityTable (user table).

Authors

h00die
Caleb Stewart [email protected]

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/billquick_txtid_sqli
msf auxiliary(billquick_txtid_sqli) > show actions
...actions...
msf auxiliary(billquick_txtid_sqli) > set ACTION < action-name >
msf auxiliary(billquick_txtid_sqli) > show options
...show and set options...
msf auxiliary(billquick_txtid_sqli) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.