Skip to content

ntrampham/REDCap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commits
 
 
 
 

Repository files navigation

SQL Injection in REDCap Versions <13.8.0

Issue Summary

An SQL Injection vulnerability was found on /<redcap_version>/MyCapMobileApp/update.php API. Because of lacking of verifying untrusted data $_POST['index_modal_update'] results in malicious payload being passed to the SQL query via the $page_id variable.

After sending the malicious payload, the response time exceeds 5 seconds.

Issue Impact

An attacker can employ a SQL Injection attack to dump all data from the database.

Besides that, the REDCap password reset mechanism requires a password_reset_key provided in the URL delivered to the user. An attacker can quickly obtain this key using the SQL Injection bug already found and change the passwords of any REDCap users by forging their password reset requests. Then he can access whatever account he desires, especially the admin account.

Change the admin password successfully

Discovery/Disclosure Timeline

  • 20/05/23: Vulnerability discovered
  • 01/07/23: Vulnerability reported to REDCap
  • 07/07/23: Patch provided by REDCap

References

REDCap Changelog

Major security fix: An SQL Injection vulnerability was found on a MyCap-related page, in which a malicious user could potentially exploit it and execute arbitrary SQL commands on the database by manipulating an HTTP request in a specially-crafted way. In order to exploit this, the user must be logged in as a REDCap user and must also have one or more instruments enabled as MyCap tasks.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published