Cyberoam - Blind SQL Injection

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

<pre class="">1. Description The username field in the captive portal of Cyberoam NG firewall is vulnerable to SQL Injection and can be exploited to execute sql commands on the database. The username field is vulnerable to the following types of SQL Injections a) Boolean-based blind sql injection b) Stacked queries 2. Proof of Concept The data send to the server while logging in through the captive portal is like "mode=191&amp;username=cyberuser&amp;password=cyberpass&amp;a=1439886198757&amp;producttype=0" The query generated in backend server must be something like this SELECT password FROM table_name WHERE username = 'cyberuser' a) Boolean-based blind sql injection If a valid username/password combination is known than boolean-based blind sql injection can be done. If username is set to cyberuser' AND 'x'='x , data send will be "mode=191&amp;username=cyberuser' AND 'x'='x&amp;password=cyberpass&amp;a=1439886198757&amp;producttype=0" And sql query will become SELECT password FROM...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息