Hi Team
I would like to report Time-based blind SQLI.
Description:
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.
Vulnerable parameter: order_col
Step to reproduce the issue:
1- Login to SEO admin Panel
2- Copy paste below link:
Impact
Attacker can mount one or more of the following type of attacks successfully:
• Reading, updating and deleting arbitrary data/tables from the database
• Executing commands on the underlying operating system
The text was updated successfully, but these errors were encountered:
Hi Team
I would like to report Time-based blind SQLI.
Description:
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.
Vulnerable parameter: order_col
Step to reproduce the issue:
1- Login to SEO admin Panel
2- Copy paste below link:
/archive.php?from_time=2021-03-08&order_col=name&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-03-09&website_id=0
3- Replace value of "order_col" parameter with below payloads:
Payload: (SELECT 7397 FROM (SELECT(SLEEP(10)))keuG)
4- You can see the page sleeps for 10 seconds and maybe some seconds more.
Video POC: https://drive.google.com/file/d/1ZM8_UvJR5HUGJzzZWBoM7k7Qw0MZS4WN/view?usp=sharing
Automated way:
sqlmap -r file.txt --batch --level 5 --risk 3 --dbms MYSQL --dbs --technique=T --flush-session
Impact
Attacker can mount one or more of the following type of attacks successfully:
• Reading, updating and deleting arbitrary data/tables from the database
• Executing commands on the underlying operating system
The text was updated successfully, but these errors were encountered: