https://github.com/karthikuj/cve-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
https://github.com/karthikuj/cve-2022-31101
blockwishlist cve-2022-31101 exploit prestashop
Last synced: 3 months ago
JSON representation
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
- Host: GitHub
- URL: https://github.com/karthikuj/cve-2022-31101
- Owner: karthikuj
- Created: 2022-08-09T10:29:48.000Z (almost 3 years ago)
- Default Branch: master
- Last Pushed: 2022-08-09T14:55:35.000Z (almost 3 years ago)
- Last Synced: 2025-01-30T21:42:30.106Z (3 months ago)
- Topics: blockwishlist, cve-2022-31101, exploit, prestashop
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 25
- Watchers: 2
- Forks: 13
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)## Usage
- `python3 cve-2022-31101.py`
- Give the url to the wishlist when prompted. Example of a url: `http://example.com/module/blockwishlist/view?id_wishlist=1`
- Give the cookies for your account when prompted.
- Now it will start attacking the website.## In action
### Note
This exploit assumes the prefix for the table names in the database to be `ps_`. It is the default prefix given by PrestaShop.