Loading HuntDB...

[www.zomato.com] SQLi on `order_id` parameter

Critical
Z
Zomato
Submitted None

Team Summary

Official summary from Zomato

@saltedfish found that a parameter `order_id` was vulnerable to SQLi. ###POC (for everyone to learn from this disclosed report) - There was an endpoint which had `order_id` as one of the parameters. - Requesting `'-if(1=2,'0','1')-'` in `order_id` parameter changed the Response Length and upon further investigation from @saltedfish, he found that the boolean technique could be used to proof data retrieval. We'd like to thank @saltedfish for helping us in keeping @zomato secure :) [REQUEST] Also, a small request to everyone reading this report, Burp Suite Free Version offers lot of features to start with and HackerOne has partnered with Burp Suite to offer 3 months free of Burp Suite Pro to Hackers on achieving `500 Reputation Points`. Use that opportunity instead of using Pirated Version. Cheers.

Reported by saltedfish

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1000.00

Submitted

Weakness

SQL Injection