CVE-2021-42258
CRITICAL KEV RANSOMWARE NUCLEIBQE Billquick Web Suite < 22.0.9.1 - SQL Injection
Title source: ruleDescription
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.
Exploits (1)
metasploit
WORKING POC
by h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/billquick_txtid_sqli.rb
Nuclei Templates (1)
BillQuick Web Suite SQL Injection
CRITICALby dwisiswant0
Scores
CVSS v3
9.8
EPSS
0.9410
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-10-22
InTheWild.io
2021-10-22
ENISA EUVD
EUVD-2021-29234
Ransomware Use
Confirmed
CWE
CWE-89
Status
published
Products (1)
bqe/billquick_web_suite
19 - 22.0.9.1
Published
Oct 22, 2021
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026