The query API in Casdoor prior to 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
Simple Java project showcases two vulnerabilities - a SQL injection and a RCE that although simplified were inspired from two real-word CVEs
Simple Java Demo
This simple Java project showcases two vulnerabilities - a SQL injection and a RCE Although these have been distilled into simple examples they were inspired by two real CVEs that were detected
You will be able see the two vulnerabilities that CI Fuzz detected and step into the code directly to see the underlying cause The fixed branch is re-fuzzed and the v
Dump SQL database version on host running Casdoor < 1.13.1
POC for CVE-2022-24124
Exploit Code for CVE-2022-24124 aka Casdoor SQL Injection
Exploit Links: [ExploitDB-50792] [PacketStormSecurity]
Expected outcome: Dump SQL database version on host running Casdoor < 1131
Intended only for educational and testing in corporate environments
Exploit Usage
Barricade➜ go run exploitgo -u 127001:8080
-=Casdoor SQL Inje
POC for CVE-2022-24124
Exploit Code for CVE-2022-24124 aka Casdoor SQL Injection
Exploit Links: [ExploitDB-50792] [PacketStormSecurity]
Expected outcome: Dump SQL database version on host running Casdoor < 1131
Intended only for educational and testing in corporate environments
Exploit Usage
Barricade➜ go run exploitgo -u 127001:8080
-=Casdoor SQL Inje