Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/karthikuj/cve-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
https://github.com/karthikuj/cve-2022-31101
blockwishlist cve-2022-31101 exploit prestashop
Last synced: 4 months ago
JSON representation
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)
- Host: GitHub
- URL: https://github.com/karthikuj/cve-2022-31101
- Owner: karthikuj
- Created: 2022-08-09T10:29:48.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-08-09T14:55:35.000Z (over 2 years ago)
- Last Synced: 2024-10-10T00:41:43.569Z (4 months ago)
- Topics: blockwishlist, cve-2022-31101, exploit, prestashop
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 26
- Watchers: 2
- Forks: 13
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2022-31101
Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)## Usage
- `python3 cve-2022-31101.py`
- Give the url to the wishlist when prompted. Example of a url: `http://example.com/module/blockwishlist/view?id_wishlist=1`
- Give the cookies for your account when prompted.
- Now it will start attacking the website.## In action
![cve-2022-31101](https://user-images.githubusercontent.com/59091280/183629068-cbd9ffad-c3cf-4a5e-9571-5d8d5becbe3d.png)### Note
This exploit assumes the prefix for the table names in the database to be `ps_`. It is the default prefix given by PrestaShop.