webPromedium

PulseDesk — Blind SQL Injection in Password Reset Token Extraction

hackadvisor

Task: PulseDesk support platform with password reset feature; hidden /api/v1/auth/password-policy endpoint uses token in unsanitized SQL LIKE query creating a boolean oracle. Solution: exploit blind SQLi with binary search on UNICODE(SUBSTR(...)) to extract admin's reset token character by character, then reset admin password and access the secret API master key.

$ ls tags/ techniques/
binary_search_extractionboolean_based_blind_sqlipassword_reset_token_theftlike_injectionunicode_substr_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups