The Wanda hotel and resort APP has SQL injection (including more than six thousand hotel user data)
SQL Injection for Wanda Group apps
Detailed description:
Target: Wanda Group-Wanda hotel and resort APP
Check that SQL Injection exists in the following places: (groupCode in POST, UNION query/stacked queries/Boolean blind note)
POST/modify process/found/groupHot. action HTTP/1.1Content-Length: 73Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: Invalid JSESSIONID = accept: app. wandahotels. comConnection: Keep-aliveAccept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) chrome/41.0.2228.0 Safari/537.21 Accept: */* groupCode = WRG & language = zh proof of vulnerability:
1. SQLMap vulnerability proof
2. Current Database User
3. The current database name should be Wan Yue's database
4. list all databases
5. list all tables of the current database wyhppdb, 72 in total
6. the user table should be dbo. login_info, with more than six thousand records ~~ It should be wanyue Member/hotel user information. We will not be able to run it anymore ~~
Solution:
Please advise more ~~