Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1301 PoC — s::can moni::tools SQL注入漏洞

Source
Associated Vulnerability
Title:s::can moni::tools SQL注入漏洞 (CVE-2024-1301)
Description:s::can moni::tools是s::can公司的一个管理几乎无限数量的站点、在线探头、分析仪和参数的平台。 s::can moni::tools 4.6.3 版本存在SQL注入漏洞,该漏洞源于可以通过 j_username 参数向服务器发送特制的 SQL 查询,并检索数据库中存储的信息。
Description
POC Badgermeter moni tool - CVE-2024-1301
Readme
# CVE-2024-1301 --- Badgermeter moni tool - SQL Injection
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-badger-meters-monitool

CVE-2024-1301: 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-89.

**Software link**: https://www.s-can.at/en/product/monitool/

**Version**: 4.6.3

**@author**: Guillermo García Molina

**Description**: In s:can moni:tools up to and including version 4.6.3, an unauthenticated attacker could get full access to the database through SQL injection. This may result in loss of confidentiality, loss of integrity and DoS.

## POC

The parameter j_username which is included in the login request, is affected by a sql injection vulnerability. In the following picture is shown the request where the payload test'+AND+1=(SELECT+1+FROM+PG_SLEEP(10))+AND+'GKZy'='GKZy&j_password=test is included, forcing the database to wait 10 second before sending the response:

![image](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection/assets/26895345/ad91b996-49ee-44d7-a2eb-e62de653421a)

![image](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection/assets/26895345/93c6cbf9-5687-45f2-a3ad-c1b4f3a7bd8c)

Using blind sqli injection technique (https://owasp.org/www-community/attacks/Blind_SQL_Injection), it has been possible to dump all the data of the database, for example dumping the User table of the ipc database:

![image](https://github.com/guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection/assets/26895345/879dfb0c-2bf0-4269-bb02-c628f017fb08) 
File Snapshot

[4.0K] /data/pocs/3611babe71548ad53a28ab3289ced6903d146896 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.