This exploit leverages a pre-authentication SQL injection vulnerability in Ganib 2.x to write a JSP shell to a writable web path. It constructs a malicious SQL query via the 'userDomain' parameter to drop a JSP payload, enabling remote code execution.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:Ganib Project Management <= 2.3
No auth needed
Prerequisites:Network access to the target · Writable web directory path · JSP shell file to deploy