CVE-2022-43168 is an important vulnerability discovered recently in Rukovoditel, a widely-used open-source project management application. In version 3.2.1 of Rukovoditel, a SQL injection vulnerability exists, centered around the reports_id parameter. This post will provide an in-depth look at the cause of this vulnerability, provide a code snippet that demonstrates the vulnerability, and discuss how it can be exploited by an attacker. Additionally, this post links to the original references containing more detailed information about the vulnerability.

The Issue

In Rukovoditel's version 3.2.1, the SQL injection vulnerability occurs in the reports_id parameter, which is insufficiently sanitized, making it possible for an attacker to execute arbitrary SQL queries. This vulnerability can potentially lead to unauthorized access to sensitive data, data manipulation, and even complete system takeover.

Code Snippet

The following code snippet, taken from reports/users_filters.php in Rukovoditel v3.2.1, demonstrates the vulnerability:

$filter_query = db_query("select rf.*, f.type as field_type,, f.is_heading from app_reports_filters rf, app_fields f where and rf.reports_id='" . db_input(request::get('reports_id')). "'");

In the above code, the reports_id parameter is passed directly into the SQL query without proper sanitization, leading to a SQL injection vulnerability.

Exploit Details

An attacker can exploit this vulnerability by injecting malicious SQL code into the reports_id parameter. As an example, consider the following malicious input:

reports_id=1' and (select 1 from (select count(*),concat((select concat(database())) from information_schema.tables limit 1),floor(rand()*2))x from information_schema.tables group by x)a) and '1'

By inserting this SQL injection payload into the reports_id parameter, an attacker can potentially access sensitive information from the database and carry out other malicious activities.


The original report on this vulnerability is found in the following security advisory from CVE Project. Additionally, the National Vulnerability Database (NVD) entry provides further details regarding the severity and impact of this vulnerability.


To protect against the CVE-2022-43168 vulnerability, users are advised to update Rukovoditel to the latest version as soon as it becomes available. Until then, strict controls over access to the affected application should be enforced. Additionally, developers should implement proper input validation and sanitization techniques to mitigate the risk of SQL injection attacks.

In conclusion, CVE-2022-43168 is a critical SQL injection vulnerability discovered in Rukovoditel v3.2.1. By understanding the root cause of this vulnerability and how it can be exploited, one can take the necessary steps to ensure the security of their systems and applications. Stay tuned for further updates on this vulnerability and others like it, as well as best practices for combating cybersecurity threats.


Published on: 10/28/2022 17:15:00 UTC
Last modified on: 11/01/2022 12:50:00 UTC