Boost _ Shardeum_ Ancillaries 34474 - [Websites and Applications - Insight] SQL injection in json-rp
Description
Brief/Intro
Vulnerability Details
function txStatusSaver() {
...
let { txHash, injected, accepted, reason, type, to, from, ip, timestamp, nodeUrl } = txs[0]
...
let placeholders = `NULL, '${txHash}', '${type}', '${to}', '${from}', '${injected}', '${accepted}', '${reason}', '${ip}', '${timestamp}', '${nodeUrl}'`
let sql = 'INSERT OR REPLACE INTO transactions VALUES (' + placeholders + ')'
...
}Impact Details
Proof of concept
Set up shardeum network
Set up json rpc server
Exploit
Preparation
Run
PreviousBoost _ Shardeum_ Ancillaries 34473 - [Websites and Applications - Low] Insight XSS in json rpc servNextBoost _ Shardeum_ Ancillaries 34475 - [Websites and Applications - Low] CSRF in Json RPC Server allo
Last updated
Was this helpful?