Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18890 PoC — Redmine SQL注入漏洞

Source
Associated Vulnerability
Title:Redmine SQL注入漏洞 (CVE-2019-18890)
Description:A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 allows Redmine users to access protected information via a crafted object query.
Description
CVE-2019-18890 POC (Proof of Concept)
Readme
# CVE-2019-18890
CVE-2019-18890 POC (Proof of Concept)

REDMINE UP TO 3.2.9/3.3.9 SQL INJECTION  

https://nvd.nist.gov/vuln/detail/CVE-2019-18890

## Requirements: 
+ Access credentials  
+ Subproject is required  
+ REST API is enabled  


On Mysql the first query on which injection occurs looks like the example below with the "-SLEEP(5)" being the injected part:  
<code>SELECT COUNT(*) FROM `issues` INNER JOIN `projects` ON `projects`.`id` = `issues`.`project_id` INNER JOIN `issue_statuses` ON `issue_statuses`.`id` = `issues`.`status_id` WHERE (((projects.status <> 9 AND EXISTS (SELECT 1 AS one FROM enabled_modules em WHERE em.project_id = projects.id AND em.name='issue_tracking')) AND (((projects.is_public = 1 AND projects.id NOT IN (SELECT project_id FROM members WHERE user_id IN (4,2))) AND ((issues.is_private = 0)))))) AND ((issues.status_id IN (SELECT id FROM issue_statuses WHERE is_closed=0)) AND projects.id IN (1,2,3-SLEEP(5)))</code>



File Snapshot

[4.0K] /data/pocs/2d78b0e1d5da27f7c10933f4c64d5b51db4a06af ├── [2.9K] exploit.py └── [ 962] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →