Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18890 PoC — Redmine SQL注入漏洞

Source
Associated Vulnerability
Title:Redmine SQL注入漏洞 (CVE-2019-18890)
Description:Redmine是一套开源的基于Web的项目管理和缺陷跟踪工具。该产品提供项目管理、问题跟踪和基于角色的访问控制等功能。 Redmine 3.2.9及之前版本和3.3.10之前的3.3.x版本中存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
CVE-2019-18890 POC (Proof of Concept)
Readme
# CVE-2019-18890
CVE-2019-18890 POC (Proof of Concept)

REDMINE UP TO 3.2.9/3.3.9 SQL INJECTION  

https://nvd.nist.gov/vuln/detail/CVE-2019-18890

## Requirements: 
+ Access credentials  
+ Subproject is required  
+ REST API is enabled  


On Mysql the first query on which injection occurs looks like the example below with the "-SLEEP(5)" being the injected part:  
<code>SELECT COUNT(*) FROM `issues` INNER JOIN `projects` ON `projects`.`id` = `issues`.`project_id` INNER JOIN `issue_statuses` ON `issue_statuses`.`id` = `issues`.`status_id` WHERE (((projects.status <> 9 AND EXISTS (SELECT 1 AS one FROM enabled_modules em WHERE em.project_id = projects.id AND em.name='issue_tracking')) AND (((projects.is_public = 1 AND projects.id NOT IN (SELECT project_id FROM members WHERE user_id IN (4,2))) AND ((issues.is_private = 0)))))) AND ((issues.status_id IN (SELECT id FROM issue_statuses WHERE is_closed=0)) AND projects.id IN (1,2,3-SLEEP(5)))</code>



File Snapshot

[4.0K] /data/pocs/2d78b0e1d5da27f7c10933f4c64d5b51db4a06af ├── [2.9K] exploit.py └── [ 962] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.