image dsbw

SQL INJECTION, leaking of personal data + server misconfiguration lead to unauthorized access



Published il y a 5 jours

image de SQL INJECTION, leaking of personal data + server misconfiguration lead to unauthorized access

Hi, This is DevSecure Team ,we specialize in uncovering hidden vulnerabilities that pose real-world risks to modern web applications.
All vulnerabilities shared in these write-ups are fully redacted — any company names, domains, or sensitive details are replaced with placeholders such as company.com. Each finding was responsibly disclosed through the Intigriti platform and has been verified and resolved by the affected vendor.

Every post represents our commitment to ethical hacking, responsible disclosure, and continuous learning, helping organizations strengthen their defenses while contributing to a safer global cybersecurity ecosystem.

Description:

in one of the earlier target that i hunted in before, after the recon step, i found an interesting service url, service-xx.company.com, there was some similare website service-aa.company.com, service-bb.company.com,service-cc.company.com all similare, but this one service-xx.company.com it has some special behavior whene i access to service-xx.company.com/app i got 302 redirect to login page, not like the other services has 404 not found error. from there i know thats it has to be somthing hosted for there internal team. after some recon i found a regetration page in http://service-en.ibood.com/ i bypass thats and loged in by create new account evene im not autorized (misconfiguration) https://service-xx.company.com/app/basic/xxxx/create_accountthan i loged in as one of there internal staff, in this support admin webapp i found an interesting sql injuction

Affected Parameter / Endpoint: - https://service-xx.company.com/app/searchResults

Proof of Concept:

Step-by-step to reproduce:
  • Step 1: this service is just for company workers and no other users is autorize to use it http://service-xx.company.com/ i bypass thats and loged in by create new account evene im not autorized (misconfiguration)
  • https://service-xx.company.com/app/basic/xxxx/create_account
  • Step 2: geting some data im not autorize to see it look the picture 1 and 2
  • Step 3: and here we go now with sql injection on the application
  • just for prof of concept i do just poc and stop shouldn't play with this in the server as it can have a critical damage and get insensive information [ FOR POC Watch the attached video ] .
  • POST /app/searchResults HTTP/1.1 Host: service-xx.company.com Cookie: xxx Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Fetch-Dest: document Referer: https://service-xx.company.com/app/xxxx Accept-Encoding: gzip, deflate Accept-Language: fr-FR,fr;q=0.9,en-US;q=0.8,en;q=0.7

Impact:

An attacker could use this vulnerability to control the content in the database, exfiltrate information, and potentially obtain remote code execution.

Severity:

Critical — SQL Injection.

  • Timeline :
  • Platform : Intigriti
  • Reported: 03/06/2022
  • Triaged: 03/06/2022
  • Accepted & paid: 08/06/2022
  • Bounty: €750

https://app.intigriti.com/profile/merroun

More Articles You May Like

Blog Image
BROKEN ACCESS CONTROL lead to leak all users sensitive data in Company database, including emails

Description: BROKEN ACCESS CONTROL lead to leak all users sensitive data in company database, including emails in compa...

Read More →
Blog Image
IDOR Get any Customer all invoices

Description: Broken access control IDOR lead to get all invoices for any customer Affected Parameter / Endpoint: https...

Read More →
Blog Image
get personal information of workers

Description: i found a vulnerability thats make me able to extract all employees documents thats has sensitive informat...

Read More →