Lab 14: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

 This lab contains a SQL injection vulnerability in the product category filter. When the user selects a category, the application carries out an SQL query like the following:

SELECT * FROM products WHERE category = 'Gifts' AND released = 1





The first thing that comes to mind is looking at the Refine your search message on top. This tells me that it is going to the database and getting the products that meet the description



I looked at the original request and added the ‘+OR+1=1— and this gave me the extra products.



Comments

Popular posts from this blog

Practitioner Lab 1: File path traversal, traversal sequences blocked with absolute path bypass

Practitioner Lab 7: SSRF with filter bypass via open redirection vulnerability

Practitioner Lab 4: File path traversal, validation of start of path

Practitioner Lab 5:File path traversal, validation of file extension with null byte bypass