SQL Injection in CVE Discovery Search
High
Vulnerability Details
**Summary:**
Unsanitized user-controlled inputs in the CVE Discovery Search allow for SQL injection.
**Description:**
Search terms are split on whitespace but no additional sanitization is applied, allowing arbitrary SQL statements, such as a blind or timing-based attack.
### Steps To Reproduce
1. Visit https://hackerone.com/intelligence/cve_discovery
2. Enter a search term that normally returns results, plus an injection payload such as /**/AND/**/'1%'='1 and confirm that the results are still returned
3. Change the payload to /**/AND/**/'1%'='0 and confirm that no results are returned
### Optional: Your Environment (Browser version, Device, etc)
* Chrome
### Optional: Supporting Material/References (Screenshots)
{F2211684}
{F2211685}
## Impact
Disclosure of data in Analytics Database, including report, team, and asset data
Actions
View on HackerOneReport Stats
- Report ID: 1893800
- State: Closed
- Substate: resolved
- Upvotes: 79