Skip to content

Commit 0f4d87b

Browse files
Adam BaldwinAdam Baldwin
Adam Baldwin
authored and
Adam Baldwin
committed
The exploit given in the README was not effective because there
seems to be a limitation on executing `INSERT` statements in line with the arbitrary sqlite string. Instead let's provide a table of users to dump from the search box.
1 parent 35090cd commit 0f4d87b

File tree

3 files changed

+32
-4
lines changed

3 files changed

+32
-4
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,5 +37,5 @@ docker-compose up --build --detach
3737
```
3838

3939
## Known Vulnerabilities
40-
* SQL Injection via search box. - `a%'; insert into items values (default, 'hacker item name','bad bad description'); select * from ITEMS where name like '%banan`
40+
* SQL Injection via search box. - `item%' union all select * from user; -- `
4141
* Cross Site Scripting via search box. - `<script>alert("hey guy");</script>`

bootstrapdb.js

+31-3
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,45 @@ db.serialize(function () {
66
if (err) {
77
console.error(err);
88
} else {
9-
const stmt = db.prepare('INSERT INTO item VALUES (null, ?, ?)', function (err) {
9+
const itemTbl = db.prepare('INSERT INTO item VALUES (null, ?, ?)', function (err) {
1010
if (err) {
1111
console.error(err)
1212
}
1313
});
1414

1515
for (var i = 0; i < 3; i++) {
16-
stmt.run('item-' + i, 'item-' + i + ' is the great item evar');
16+
itemTbl.run('item-' + i, 'item-' + i + ' is the great item evar');
1717
}
1818

19-
stmt.finalize(function (err) {
19+
itemTbl.finalize(function (err) {
20+
if (err) {
21+
console.error(err)
22+
} else {
23+
db.close(function (err) {
24+
if (err) {
25+
console.error(err)
26+
}
27+
});
28+
}
29+
});
30+
}
31+
});
32+
33+
34+
db.run('CREATE TABLE user (id INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, username NVARCHAR(1024) NOT NULL, password TEXT NOT NULL)', function (err) {
35+
if (err) {
36+
console.error(err);
37+
} else {
38+
const userTbl = db.prepare('INSERT INTO user VALUES (null, ?, ?)', function (err) {
39+
if (err) {
40+
console.error(err)
41+
}
42+
});
43+
userTbl.run('admin', 'S3cr37P@$$w0rD!');
44+
userTbl.run('user1', 'bad_password');
45+
userTbl.run('user2', 'worse');
46+
userTbl.run('user3', 'fail');
47+
userTbl.finalize(function (err) {
2048
if (err) {
2149
console.error(err)
2250
} else {

db/vulny.db

-12 KB
Binary file not shown.

0 commit comments

Comments
 (0)