Details

    • Type: Bug
    • Status: Closed
    • Priority: Critical
    • Resolution: Done
    • Affects Version/s: None
    • Fix Version/s: None
    • Component/s: Platform
    • Labels:
      None
    • Environment:
      Production
    • Module:
      BenAdmin - Security
    • Reported by:
      Support
    • Item State:
      Production Complete
    • Issue Importance:
      Must Have

      Description

      Praetorian initially detected a SQL injection vulnerability after submitting a variety of malicious input
      parameters to the GetEmployees endpoint. Praetorian used SQL injection payloads that caused the
      application to demonstrate a noticeable difference in response time depending on the results of the
      provided SQL query.

      Page Name: Search Employee

      Information Recovered:
      SQL Server version number, Database version, Server name

      System should not disclose this information to user.

        Attachments

          Activity

          Transition Time In Source Status Execution Times
          Vijayendra Shinde (Inactive) made transition -
          Open In Development
          1m 42s 1
          Rakesh Roy (Inactive) made transition -
          In Development In LB Testing
          1h 15m 1
          Rakesh Roy (Inactive) made transition -
          In LB Testing Stage Testing
          8s 1
          Rakesh Roy (Inactive) made transition -
          Stage Testing In Production Testing
          4d 20h 17m 1
          Prasad Pise (Inactive) made transition -
          In Production Testing Production Complete
          2d 23h 1m 1
          Prasad Pise (Inactive) made transition -
          Production Complete Closed
          2s 1

            People

            Assignee:
            prasadp Prasad Pise (Inactive)
            Reporter:
            vijayendra Vijayendra Shinde (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved: