module

Rudder Server SQLI Remote Code Execution

Disclosed
Jun 16, 2023
Created
Jul 31, 2023

Description

This Metasploit module exploits a SQL injection vulnerability in
RudderStack's rudder-server, an open source Customer Data Platform (CDP).
The vulnerability exists in versions of rudder-server prior to 1.3.0-rc.1.
By exploiting this flaw, an attacker can execute arbitrary SQL commands,
which may lead to Remote Code Execution (RCE) due to the `rudder` role
in PostgreSQL having superuser permissions by default.

Author

Ege Balcı egebalci@pm.me

Platform

Linux,Unix

Architectures

cmd, x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/rudder_server_sqli_rce
msf exploit(rudder_server_sqli_rce) > show targets
...targets...
msf exploit(rudder_server_sqli_rce) > set TARGET < target-id >
msf exploit(rudder_server_sqli_rce) > show options
...show and set options...
msf exploit(rudder_server_sqli_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.