404-handler

1 article
sort: new top best
clear filter
0 9/10

A critical SQL injection vulnerability was discovered in a legacy 404 error handler that directly concatenates user-controlled REQUEST_URI into an INSERT statement without sanitization. The attacker exploited INSERT-based, multi-row XPATH injection combined with EXTRACTVALUE() error-based extraction to bypass automated tools and dump database contents, revealing the application ran with MySQL root privileges.

SQLMap Ghauri Sublist3r DNSRecon Amass viewdns.info EXTRACTVALUE mysqli Eduardo F
infosecwriteups.com · Eduardo F · 4 hours ago · details