Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
Yahoo! was recently impacted by a critical web application vulnerabilities which left website's database and server vulnerable to hackers.

A cyber security expert and penetration tester, Ebrahim Hegazy a.k.a Zigoo from Egypt, has found a serious SQL injection vulnerability in Yahoo's website that allows an attacker to remotely execute any commands on its server with Root Privileges.

According to Hegazy blog post, the SQLi vulnerability resides in a domain of Yahoo! website i.e. https://innovationjockeys.net/tictac_chk_req.php.
Cybersecurity

Any remote user can manipulate the input to the "f_id" parameter in the above URL, which could be exploited to extract database from the server.
Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
While pentesting, he found username and password (encoded as Base64) of Yahoo!' admin panel stored in the database. He decoded the Administrator Password and successfully Logged in to the Admin panel.

Furthermore, SQL injection flaw also facilitate the attacker to exploit Remote Code Execution on the server and an un-patched kernel allows Root access on the server.

Admin panel allows him to upload files on the server but after uploading a file with "phpinfo();" function as a content, he found that the uploaded file was named in ".xrds+xml" instead of being in ".php"
Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
But in second attempt, he intercepted the file uploading request and renamed the "Content-Type" Header to "application/php", which triggers the PHP code on the target server successfully i.e. Remote Code Execution.

Hegazy reported the flaw to Yahoo! Security Team on 5th September and interesting fact, Yahoo! has fixed the flaw within a day after he reported. But, strange part is that the purple company didn't considered this vulnerability for a reward, as the vulnerable domain is out-of-scope of Yahoo!'s bug bounty program.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.