Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-47253 PoC — Qualitor 安全漏洞

Source
Associated Vulnerability
Title:Qualitor 安全漏洞 (CVE-2023-47253)
Description:Qualitor是一个应用。 Qualitor 8.20版本及之前版本存在安全漏洞。攻击者利用该漏洞通过html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden参数中的PHP代码执行任意代码。
Description
CVE-2023-47253 | Qualitor <= 8.20 RCE
Readme
# CVE-2023-47253
CVE-2023-47253 | Qualitor &lt;= 8.20 RCE

## Description
Qualitor is a platform for business process management, and this system is present in various companies in Brazil that can be identified simply by using Google dorking.

Our team identified a vulnerability in the application susceptible to Remote Code Execution (RCE), which allows remote execution of PHP code, such as functions like system() and passthru().

In the code below, you can see the source code of the vulnerable page calling an eval() function, which enables the remote execution of codes. This occurs in the file /html/ad/adpesquisasql/request/processVariavel.php.

```php
include("../../../../configLingua.php");
header("Content-type: text/javascript; charset=".$_SESSION['A_appEncoding']);
header("Expires: Thu, 01 Jan 1990 00:00:00 GMT");

$strReturn = '';

eval($_REQUEST['gridValoresPopHidden']);

importClass('AdPesquisaSqlVar');
$bean = new AdPesquisaSqlVarBean();

$vo = $bean->povoaVoComArray($_REQUEST);

if (in_array($_REQUEST['nmalias'],

array('dtiniciomesatual',
'dtfimmesatual',
'dtiniciomespassado',
```

## Proof of Concept (POC)
Just access the URL with your PHP code in "gridValoresPopHidden" parameter.

![image](https://github.com/user-attachments/assets/920ea96c-8a15-4ad7-9446-37d842b7a40c)

### Researches
https://www.linkedin.com/in/xvinicius/

https://www.linkedin.com/in/hairrison-wenning-4631a4124/

- OpenXP Research Team
File Snapshot

[4.0K] /data/pocs/4b864558de3b9369e57e0b616d22dcc4face39bd └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.