The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Validating SQL Injection vulnerability reported by BurpSuite

Vandesh | Last updated: May 07, 2024 10:27AM UTC

Hi, While scanning our website with Burp Suite we found there is SQL injection vulnerability. I tried SQLMAP to confirm the vulnerability, but it reported false positive. I tried playing around with few switches of SQLMAP but output didn’t change. But Burp rescan again flagged the vulnerability. Is there any way which can help us ascertain that output of Burp is correct and we can exploit it? Below is the output of Burp Issue detail The name of an arbitrarily supplied URL parameter appears to be vulnerable to SQL injection attacks. The payload '+(select load_file('\\\\go8u64qr68z2wl7awpyrczsopfv9j7kvbyzsmia7.oastify.com\\zqs'))+' was submitted in the name of an arbitrarily supplied URL parameter. This payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.The database appears to be MySQL. The behaviour appears to be asynchronous, and the Collaborator interaction occurred approximately 22 minutes after the scan of the item was completed. Please help.

Syed, PortSwigger Agent | Last updated: May 07, 2024 03:06PM UTC