Loading HuntDB...

System Error Reveals Sensitive SQL Call Data

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by 5050thepiguy

Vulnerability Details

Technical details and impact analysis

Information Exposure Through Debug Information
**Summary:** If you attempt to login at https://███.mil/sso/LoginRequest.do using a very long username, the application will respond showing a stack trace information with sensitive SQL data call information. This reveals too much information about SQL calls to the database. Please see the attached PoC video. **Description:** Login at https://██████████.mil/sso/LoginRequest.do using a very long username and the application will respond showing a stack trace information with sensitive SQL data call information. ## Step-by-step Reproduction Instructions (1) Go to https://██████.mil/sso/LoginRequest.do (2) Enter in any username and password and Intercept the request with Burp Suite. (3) Generate a long string of characters such as 100,000 characters and enter that into the "username" field and send the request. (4) Observe the stack trace error and observe the following information below showing sensitive SQL blocked: Internal Exception: java.sql.SQLException: ORA-01460: unimplemented or unreasonable conversion requested Error Code: 1460 ██████████ ████████ █████████ ## Suggested Mitigation/Remediation Actions: Remove any mention of the SQL database calls in the stack trace error. ##References: https://owasp.org/www-community/Improper_Error_Handling ## Impact Attacker can use the error messages to gain further knowledge of the SQL system to launch future attacks.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Exposure Through Debug Information