legacy-infrastructure

2 articles
sort: new top best
clear filter
0 9/10

A critical SQL injection vulnerability was discovered in a legacy 404 error handler that directly concatenates user-controlled REQUEST_URI into an INSERT statement without sanitization. The attacker exploited INSERT-based, multi-row XPATH injection combined with EXTRACTVALUE() error-based extraction to bypass automated tools and dump database contents, revealing the application ran with MySQL root privileges.

SQLMap Ghauri Sublist3r DNSRecon Amass viewdns.info EXTRACTVALUE mysqli Eduardo F
infosecwriteups.com · Eduardo F · 4 hours ago · details
0 5/10

A researcher discovered a critical SQL injection vulnerability in an abandoned website, exploiting a chain of weaknesses in legacy infrastructure. The writeup details how poor maintenance and outdated systems created an attack surface for database exploitation.

infosecwriteups.com · Eduardo F · 4 hours ago · details