This exploit demonstrates a SQL injection vulnerability in Trixbox via the 'bookId' parameter in 'conf_cdr.php'. It uses sqlmap to extract user credentials from the 'ampusers' table in the MySQL database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Trixbox All Versions
No auth needed
Prerequisites:Access to the vulnerable Trixbox web interface