Kailash bio photo


Information Security Practitioner

Twitter LinkedIn Github

SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. The impact of the SQL Injection can be extracting data from the database, dropping data, gaining OS or SQL shell access etc.

As it was private scope, I do not want to disclose the application name. So, I was testing the android application of it. I had to bypass SSL pinning to intercept the application requests. Finally, I was able to do it. The first page was the registration page while opening an app, I filled in all the necessary details. An OTP code was sent to our provided phone number. I used a random six-digit code and intercepted the OTP validation request as shown below. Registration request Then I sent the above request to Repeater tab in Burp suite and added a single quote on DeviceId parameter. Modified requests look like "DeviceId":"lol'" SQL Injection Request And the response was like: SQL Injection Response This confirms the existence of the vulnerability. To be assured I used the time delay command for few databases as SLEEP(10) WAITFOR DELAY '0:0:10' SELECT pg_sleep(10) and second one worked as shown below. SQL Injection Requets
Then in the response time, we can see 10ms delays. It confirms MSSQL Injection. SQL Injection Response To make proof of concept I decided to create a database object using the query 'CREATE TABLE kailash (line varchar(8000));--'

SQL Injection Response

After discussion with the development team, it was confirmed that the above query executed successfully.
SQL Injection Response

Note: I used different devices during the assessment so you may find difference in parameter values in used screenshots.