Was conducted a application pentest on a client site and found that the website is vulnerable to SQL Injection. The DBMS is MS SQL Server.
The problem:
The problem:
- There's a some sort of WAF or keyword filter looking for common SQLi payload such as 1 or 1=1 etc.
- Only successful test was via Time Based, but the page doesn't load with a consistent time pattern which affects the result.
- Automated tools doesn't help.
- Burpsuite able to exfiltrate the IP address via DNS request but I have no external domain to test it manually. (eventually after found a way to exfiltrate via DNS, the result obtained seems different from Burpsuite)
Solution:
- My friend suggesting me to use HEAD then to ignore the content as it is the reason why the page doesn't have a consistent time response.
- Doing a some read on it and it works!
Change the method into HEAD at Burpsuite |
Response now have a consistent pattern
Thanks!
References :
|