官术网_书友最值得收藏!

LocalTapiola SQL injection

  • Title: SQL injection in viestinta.lahitapiola.fi.
  • Reported by: Yasar and Anandakshya.
  • Bounty Rewarded: $1,350 and $1,560.
  • Web application URL: https://viestinta.lahitapiola.fi.
  • Description: Localtapiola is basically an insurance company that provides different kinds of life and non-life insurance policy to its customers; with its digital presence and online transaction-based system, it has one of the most active programs on Hackerone. Localtapiola had two very descriptive SQL injection reports that I decided to include in this chapter.

SQL injection by Yasar:

This was a very simple error-based SQL injection in Localtapiola, which Yasar identified. The URL where the SQL injection was found was as follows: http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674.

The vulnerable parameter was regId. He simply used sqlmap to exploit the SQL injection after identifying it:

./sqlmap.py -u "http://viestinta.lahitapiola.fi/webApp/cancel_iltakoulu?regId=478836614&locationId=464559674" -p regId
  

He then obtained the desired output of the exploit code and was able to verify the SQL injection.

SQL injection by Anandakshya:

This was another SQL injection of a similar nature found by Anand. He identified the vulnerability in the email parameter and exploited it by sqlmap there on http://viestinta.lahitapiola.fi/webApp/omatalousuk?email=aaaaa.

主站蜘蛛池模板: 璧山县| 滨州市| 革吉县| 绥芬河市| 肇源县| 武宁县| 金川县| 保靖县| 乃东县| 怀来县| 萝北县| 永靖县| 衡东县| 通榆县| 陈巴尔虎旗| 镇康县| 安化县| 深圳市| 安康市| 元朗区| 鸡泽县| 建湖县| 武夷山市| 泰来县| 宁都县| 嘉鱼县| 双峰县| 桂阳县| 湖南省| 砀山县| 台山市| 阜南县| 宣化县| 蕉岭县| 香港 | 祁门县| 汽车| 抚顺市| 茌平县| 彭泽县| 九龙坡区|