Bug Report
Bug Report
From : pab412183
Severity : High
WAF Bypass :-
To prevent WAF bypass, developers should ensure that their WAF rules
are up-to-date and comprehensive. Additionally, they can implement
additional security measures such as rate limiting, IP blocking, and
user-agent filtering.
[ Copy that full url written in Payloads section and paste it in your
browser to see how critical it is ]
Step of reproduce :-
2. Then put an single cote (‘) after the parameter value . (.php?id=2’)
like this.
3. You will a change in your site .Notice that all of your content’s are
gone. Not actually gone it’s hidden because this site contains
(Error Based SQLI). You can learn from that embedded link and
from free recourses on online how it’s works.
4. Use this payload that i made and able to exploit SQLI on your
website .
5. As you can see it brakes through the (WAF) and able to dump data
from backend database .
6. You can see after using that dios we dumped username,email and
password .we can also use Burpsuit and other automated tools to
do the same thing but i did it manually.
Mitigation :
2. Input Validation:
● Implement strict input validation on user inputs. Only allow
expected characters and values, and reject anything that doesn't
adhere to your predefined rules.
5. Error Handling:
● Customize error messages so that they don't reveal sensitive
information about the database structure. Display generic error
messages to users and log detailed errors for administrators.
Remember that SQL injection is just one of many security risks web
applications can face. Implementing a robust security strategy involves
multiple layers of defense, including input validation, secure coding practices,
and ongoing monitoring and testing for vulnerabilities.
POC (proof of concept):-
1.
2.
3.