- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 178字
- 2021-06-10 18:35:35
LocalTapiola SQL injection
- Title: SQL injection in viestinta.lahitapiola.fi.
- Reported by: Yasar and Anandakshya.
- Bounty Rewarded: $1,350 and $1,560.
- Web application URL: https://viestinta.lahitapiola.fi.
- Description: Localtapiola is basically an insurance company that provides different kinds of life and non-life insurance policy to its customers; with its digital presence and online transaction-based system, it has one of the most active programs on Hackerone. Localtapiola had two very descriptive SQL injection reports that I decided to include in this chapter.
SQL injection by Yasar:
This was a very simple error-based SQL injection in Localtapiola, which Yasar identified. The URL where the SQL injection was found was as follows: http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674.
The vulnerable parameter was regId. He simply used sqlmap to exploit the SQL injection after identifying it:
./sqlmap.py -u "http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674" -p regId
He then obtained the desired output of the exploit code and was able to verify the SQL injection.
SQL injection by Anandakshya:
This was another SQL injection of a similar nature found by Anand. He identified the vulnerability in the email parameter and exploited it by sqlmap there on http://viestinta.lahitapiola.fi/webApp/omatalousuk?email=aaaaa.
推薦閱讀
- 數(shù)字身份與元宇宙信任治理
- SASE原理、架構(gòu)與實踐
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 硬黑客:智能硬件生死之戰(zhàn)
- 網(wǎng)絡(luò)安全技術(shù)與實訓(xùn)(第4版)(微課版)
- 可信計算3.0工程初步(第二版)
- 信息安全等級保護測評與整改指導(dǎo)手冊
- CTF那些事兒
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 持續(xù)集成:軟件質(zhì)量改進和風(fēng)險降低之道
- 黑客攻防從入門到精通
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- 信息內(nèi)容安全管理及應(yīng)用
- Learn Azure Sentinel
- 聯(lián)邦學(xué)習(xí)原理與算法