webPromedium

Lab 86 — DealForge — SQL Injection via Backslash Escape Bypass of Quote-Doubling in H2

hackadvisor

Task: CRM platform with contacts search using H2 database; input sanitized by quote-doubling but backslash not escaped. Solution: Backslash escape bypasses quote-doubling, enabling UNION/error-based SQLi to enumerate SYSTEM_SECRETS table and extract the flag.

$ ls tags/ techniques/
backslash_escape_quote_doubling_bypasserror_based_data_extractionunion_select_with_listaggchar_concatenation_to_avoid_quotessql_comment_for_repeated_injection_points

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups