Vulnerability Summary
Pre-authenticated SQL Injection on api.redacted-target.com through /api/v1/auth/login via POST parameter "module" leads to Sensitive Data Exposure and Remote Code Execution
![]()
A vulnerability was identified in the application's login endpoint where the value of a JSON field in the POST body was concatenated directly into the column list of a backend SQL query. An unauthenticated attacker could inject arbitrary PostgreSQL expressions into this position, achieving full read access to the production database, arbitrary local file reads as the database OS user, and the ability to overwrite arbitrary files writable by that same user.
The endpoint /api/v1/auth/login accepts a JSON body with fields email, password, and module. The backend uses the value of module to build a SELECT query that looks structurally like:
No comments yet.
Be the first to share your thoughts
Log in to join the discussion.
Sign In