Loading HuntDB...

SQL Injection Union Based

Critical
A
Automattic
Submitted None
Reported by fuzzme

Vulnerability Details

Technical details and impact analysis

## Summary: Hello, I have found a SQL Injection Union Based on `https://intensedebate.com/commenthistory/$YourSiteId ` The `$YourSiteId` into the url is vulnerable to SQL Injection. ## Steps to reproduce 1. Logging into `https://intensedebate.com` 2. After create your own site on `https://intensedebate.com/install` and follow all steps 3. Now you need to know your site id, to get then you need go to `https://intensedebate.com/user-dashboard` and you can see on the right side of the page your site list, choice your site and click to the link `Overview`. You will be redirected to `https://intensedebate.com/dash/$YourSiteId`. 4. Now you have your site id, go to the vulnerable URL with your site id `https://intensedebate.com/commenthistory/$YourSiteId`. 5. Now Trigger the SQL Injection with this following link `https://intensedebate.com/commenthistory/$YourSiteId%20union%20select%201,2,@@VERSION%23` (!) You need to do this with your own site id (!) 6. Now you can see `10.1.32-MariaDB` on the page. ## POC @@VERSION {F1096977} current_user() {F1096976} Video POC ## IMPORTANT Can you see my comment into [#1044698](https://hackerone.com/reports/1044698) ?? And I no longer want to put all SQL Injection issues on into my initial report [#1042746](https://hackerone.com/reports/1042746), because i don't win any reputations Thank you, Fuzzme. ## Impact Full database access holding private user information and Reflected Cross-Site-Scripting

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted