Loading HuntDB...

[www.zomato.com] Abusing LocalParams (city) to Inject SOLR query

Low
Z
Zomato
Submitted None
Reported by zzzhacker13

Vulnerability Details

Technical details and impact analysis

SQL Injection
## Hi Team! ;) I Found an **limited** ``SOLR Injection`` by Abusing LocalParams (``city``) in ``/webapi/searchapi.php``, **Therefore Please respect my decision to mark this report as** ``Medium`` **instead of** ``High`` **(Based on the fact the code is Vulnerable even if it's hard to exploit).** - Request (adding single Backslash): ```http GET /webapi/searchapi.php?city=51\ HTTP/1.1 Host: www.zomato.com Connection: close Accept: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 Accept-Encoding: gzip, deflate Accept-Language: en ``` - Response: ```http HTTP/1.1 500 Internal Server Error ``` - Request (adding double Backslashes): ```http GET /webapi/searchapi.php?city=51\\ HTTP/1.1 Host: www.zomato.com Connection: close Accept: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36 Accept-Encoding: gzip, deflate Accept-Language: en ``` - Response: ```http HTTP/1.1 200 OK ``` **As you can see - adding single Backslash** ``\`` **will break the SOLR query but by adding double Backslashes** ``\\`` **(closing it) will execute the SOLR query properly, Therefore this isn't an "Exception" - it's a valid SOLR Injection!!** - Source: **https://portswigger.net/research/backslash-powered-scanning-hunting-unknown-vulnerability-classes** ## Impact **"By exploiting 'Solr (local) Parameters Injection,' it is possible to at least modify or view all the data within the Solr cluster, or even exploit known vulnerabilities to achieve remote code execution."** - Source: **"https://www.veracode.com/blog/security-news/new-research-apache-solr-parameter-injection"**

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$100.00

Submitted

Weakness

SQL Injection