官术网_书友最值得收藏!

LocalTapiola SQL injection

  • Title: SQL injection in viestinta.lahitapiola.fi.
  • Reported by: Yasar and Anandakshya.
  • Bounty Rewarded: $1,350 and $1,560.
  • Web application URL: https://viestinta.lahitapiola.fi.
  • Description: Localtapiola is basically an insurance company that provides different kinds of life and non-life insurance policy to its customers; with its digital presence and online transaction-based system, it has one of the most active programs on Hackerone. Localtapiola had two very descriptive SQL injection reports that I decided to include in this chapter.

SQL injection by Yasar:

This was a very simple error-based SQL injection in Localtapiola, which Yasar identified. The URL where the SQL injection was found was as follows: http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674.

The vulnerable parameter was regId. He simply used sqlmap to exploit the SQL injection after identifying it:

./sqlmap.py -u "http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674" -p regId
  

He then obtained the desired output of the exploit code and was able to verify the SQL injection.

SQL injection by Anandakshya:

This was another SQL injection of a similar nature found by Anand. He identified the vulnerability in the email parameter and exploited it by sqlmap there on http://viestinta.lahitapiola.fi/webApp/omatalousuk?email=aaaaa.

主站蜘蛛池模板: 哈巴河县| 东安县| 明光市| 安多县| 大田县| 岳阳市| 神农架林区| 枣强县| 新闻| 阜新市| 平泉县| 新绛县| 开鲁县| 元阳县| 海门市| 大埔县| 汝阳县| 同江市| 册亨县| 石首市| 杭锦旗| 广元市| 杭锦后旗| 康保县| 习水县| 讷河市| 浦北县| 商南县| 陆川县| 河北省| 加查县| 黔西| 儋州市| 延川县| 二连浩特市| 合作市| 九台市| 镇雄县| 德阳市| 曲靖市| 拉孜县|