CVE-2021-43969 Quicklert for Digium Switchvox Version 10 Build 1043 – Blind SQL Injection with Out-of-Band Interaction (DNS)



Quicklert for Digium Switchvox Version 10 Build 1043 – Blind SQL Injection with Out-of-Band Interaction (DNS)


Quicklert for Digium Switchvox

Affected Versions

Version 10 Build <1051



Release Date




SQL Injection


CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)



Authentication Required?


CVSS v3 Vector


CVSS v3 Base Score

10 (Critical Severity)

Exploit Available?

No, but manually exploitable



The ‘uname’ parameter of the login.jsp page for “Quicklert for Digium Switchvox Version 10 Build 1043” is affected by both a blind SQL injection with out-of-band interaction and a time-based SQL injection. The exploitation of this vulnerability requires no prior authentication and results in the complete compromise of confidentiality, integrity, and availability of the underlying SQL database.


  1. We first escaped the value entered in the ‘uname’ parameter on the login.jsp page to inject code which called back to a DNS server under our control (Burp Collaborator in this case) utilizing the MSSQL function “master.xp_dirtree”, which lists directory contents by default. The DNS server will not be found in a local directory and will result in the server making a request to our DNS server in an attempt to find that address for the master.xp_dirtree function. Note: If you attempt to recreate this exploit, you will need to URL encode the SQL statements as seen in the screenshots below.

    Figure 1: Generic Out of Band SQL Injection with DNS Interaction to Burp Collaborator
  2. After validating that we were receiving DNS requests from the vulnerable server, it was possible to continue using the “master.xp_dirtree” function to exfiltrate data from the server including the database name, admin username, etc., by altering the above command slightly. See the example below where we retrieved the DB_NAME value by adding that additional argument:

    We can see that the DB_NAME value for Quicklert (‘NIPA’ by default) is prepended to the DNS query that we received in the Burp Collaborator tool:

  3. We could have continued this process of retrieving data piece by piece from the database through Burp Suite but there is a limitation to the string size which can be retrieved through these types of DNS queries. This led us to utilize time-based SQL injections which use a SLEEP statement to determine when a value does or does not exist based on how long the server takes to respond to a query. This is easily automated using by saving the Burp Suite request to a file and then using the following command -r yourSQLirequesthere.txt -p uname --risk 3 --level 3

    Variations on that command to “dump” database table contents provided us with the usernames and passwords of every user in the database resulting in access to the web application as a valid user.


There is no pre-packaged exploit for this vulnerability at this time although it can be easily exploited manually as shown in the Proof-of-Concept section above.


Quicklert corrected the sanitization issue in the ‘uname’ parameter in Quicklert Version 10 Build 1051.


This vulnerability was discovered by Nick Berrie (, Technical Director of Assura’s Offensive Security Operations department at Assura, Inc.


Vendor Page

CVE Description


  • 2021-11-12: Vulnerability discovered 

  • 2021-11-12: Vendor contacted

  • 2021-11-17: CVE #s issued by MITRE

  • 2022-02-22: Vendor confirmed patch

  • 2022-03-07: Public disclosure

Copyright 2022 Assura, Inc. All rights reserved.