SQL Injection on █████

Disclosed: 2022-05-12 19:57:32 By cdl To deptofdefense
High
Vulnerability Details
#### Background: It looks like the patch for #231338 has been reverted and this subdomain is yet again vulnerable to SQL injection. ### Summary: An Airforce subdomain is vulnerable to SQL Injection because the application does not produce sufficient validation on user input. This allows an attacker to execute SQL queries. ### Description: The `███=` parameter on `https://███████/█████████` does not properly sanitize ' characters, allowing an attacker to execute SQL queries! ### Impact This could potentially expose sensitive information because an attacker could potentially dump the databases on this server! ### Step-by-step Reproduction Instructions 1.) Open Firefox or any browser 2.) Visit `https://███████/██████████=' and updatexml(null,concat(0x0a,version()),null)-- [email protected]` 3.) You will see the MySQL version in the response => `██████████` User - `███████` payload => `https://████████/████████████=' and updatexml(null,concat(0x0a,user()),null)-- [email protected]` Database - `████` payload => `https://██████/█████████████=%27%20and%20updatexml(null,concat(0x0a,database()),null)--%[email protected]` ██████ ### Suggested Mitigation/Remediation Actions Sanitize input! Thanks! - Corben Douglas [@sxcurity](https://twitter.com/sxcurity)
Actions
View on HackerOne
Report Stats
  • Report ID: 277380
  • State: Closed
  • Substate: resolved
  • Upvotes: 18
Share this report