Remote Command Execution Vulnerability in ZenTao Project Management System

0x01 Vulnerability Introduction

Vulnerability in remote command execution of ZenTao project management system. ZenTao is the first domestically produced open source project management software. Its core management idea is based on the agile method scrum, with built-in product management and project management. Management, plan management, release management, document management, transaction management and other functions, in one software, the requirements, tasks, bugs, use cases, plans, releases and other elements in software development can be tracked and managed in an orderly manner, completely covering The core process of project management.

On January 10, 2023, it was detected that there was a remote command execution vulnerability in the ZenTao project management system components spread on the Internet. Vulnerability threat level: serious. This vulnerability can be used to bypass permissions and SQL injection vulnerabilities without authorization, and finally execute arbitrary commands on the server.

0x02 range of influence

17.4 ≤ Zentao ≤ 18.0.beta1 (open source version)

3.4 ≤ Zentao (Zen Tao) ≤ 4.0.beta1 (Ultimate Edition)

7.4 ≤ Zentao (Zen Tao) ≤ 8.0.beta1 (Enterprise Edition)

Vulnerability type:

remote command execution

Conditions of use:

1. User authentication: not required

2. Precondition: Unknown

3. Trigger mode: remote

Overview:

<Comprehensive assessment difficulty of use>: Unknown.

<Comprehensive assessment threat level>: serious, can cause remote command execution.

0x03 solution

How to detect component system version

After logging into the ZenTao project management system, click "About ZenTao" to view the system version.

Currently, the latest version has been officially released, and affected users are advised to update and upgrade to the latest version in time. The link is as follows:

https://www.zentao.net/download.html

Reference link: https://www.zentao.net/dynamic/zentaopms18.0.beta2-81935.html

Guess you like

Origin blog.csdn.net/qq_18209847/article/details/128659192