{"id":3121,"date":"2023-10-17T13:37:50","date_gmt":"2023-10-17T11:37:50","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=3121"},"modified":"2024-09-13T15:37:32","modified_gmt":"2024-09-13T13:37:32","slug":"webdev-websites-pentest","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/webdev-websites-pentest\/","title":{"rendered":"WebDev websites pentest"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/pentest-webdev-hfsql-blog.png&#8221; alt=&#8221;WebDev and HFSQL security audit&#8221; title_text=&#8221;WebDev and HFSQL pentest&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\">This article aims to share the results of our experience of penetration tests carried out on websites built with WebDev and the HFSQL database. It is written for pentesters and security researchers who wish to study the security of these technologies, but also for curious developers.<\/p>\n<p style=\"text-align: justify;\">It is important to emphasize that WebDev allows you to create secure web applications, but like all frameworks, it gives developers enough flexibility to introduce vulnerabilities.<\/p>\n<p style=\"text-align: justify;\">We will see in particular the possibilities offered by HFSQL in the event of SQL injections, how to authenticate on an accessible HFSQL service, as well as the replication of a local WebDev environment to study its security.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">Note:<\/span><\/strong> the illustration image was made with an AI, it is a comical reference to PC SOFT visuals which <a href=\"https:\/\/fr.wikipedia.org\/wiki\/WinDev#Pol%C3%A9mique\" target=\"_blank\" rel=\"noopener\">generally contain<\/a> people who are not in cold countries.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;tamper&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 class=\"part\" data-startline=\"14\" data-endline=\"14\">WinDev, WebDev, HFSQL, WLangage<\/h2>\n<p style=\"text-align: justify;\">Before getting to the heart of the matter, a few definitions are in order.<\/p>\n<p style=\"text-align: justify;\">First, WebDev != WebDav, isn&#8217;t it Nolan \ud83d\ude42<\/p>\n<p style=\"text-align: justify;\"><strong>WinDev<\/strong>: WinDev is a software engineering workshop (AGL) published by the company <a href=\"https:\/\/pcsoft.fr\/\" target=\"_blank\" rel=\"noopener\">PC SOFT<\/a>, the first version was created in 1993. This software allows you to design and develop applications in all areas. WinDev uses its own programming language, <strong>WLanguage<\/strong>, a simple, powerful language that is very quick to learn.<\/p>\n<p style=\"text-align: justify;\"><strong>WebDev<\/strong>: WebDev is a web application development environment. It includes a code editor, visual design interface, pre-built components, and a built-in database. In addition, it offers easy deployment features to make web applications quickly accessible online. WebDev is popular, especially in France, with developers looking to create complex and powerful web applications, while benefiting from an intuitive user interface and rapid development features.<\/p>\n<p style=\"text-align: justify;\"><strong>HFSQL<\/strong>: HFSQL (HyperFileSQL) is positioned as a relational database management system, offering advanced features for storing, organizing and retrieving data in a structured manner. In addition, HFSQL offers the possibility of using <strong>WLanguage<\/strong>, which offers advanced, easy-to-use and powerful functions, which reinforces its versatility and development capabilities. These two components, although distinct, can collaborate synergistically in the development of robust and secure applications.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Pentest of a WebDev application<\/h2>\n<p style=\"text-align: justify;\">Penetration tests on a WebDev and HFSQL web application are no different from those carried out on more widespread technologies: the vulnerabilities of the OWASP TOP10 can be encountered and the methodology remains that of a classic web pentest.<\/p>\n<p style=\"text-align: justify;\">The application is most generally deployed on a Windows environment with an IIS web server, so adapt your wordlists in case of path traversal!<\/p>\n<p style=\"text-align: justify;\">This article deals with two specificities which are not covered by the current tools available to pentesters: <strong>the exploitation of an HFSQL injection<\/strong> and <strong>authentication on the HFSQL service<\/strong> (most often on the tcp\/4900 port).<\/p>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Authenticate on HFSQL<\/h2>\n<p style=\"text-align: justify;\">It is common for the HFSQL DBMS port to be open on the Internet: WinDev thick clients may require access to this data or the database is hosted in an infrastructure different from the WebDev application. In any case, it is a dangerous practice: it is recommended to never leave the database service open on the Internet and to restrict its access (by whitelisting IP addresses, by VPN, or others).<\/p>\n<p style=\"text-align: justify;\">There are no easy-to-use tools to test the validity of an account on an open HFSQL service. Indeed, this requires the use of a specific ODBC driver, which is difficult to integrate into tools like Metasploit or Hydra (from a technological but also legal point of view).<\/p>\n<p style=\"text-align: justify;\">The solution proposed here is the use of a Windows system, with the installation of the ODBC driver and the creation of a simple PowerShell script using the latter.<\/p>\n<p style=\"text-align: justify;\">The first step is to download and install the ODBC driver: <a href=\"https:\/\/pcsoft.fr\/st\/telec\/modules-communs-28\/wx28_94s.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/pcsoft.fr\/st\/telec\/modules-communs-28\/wx28_94s.htm<\/a>.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/download_HFSQL_server_client_2xEXE-300x265.png\" width=\"300\" height=\"265\" alt=\"\" class=\"wp-image-3062 aligncenter size-medium\"><\/p>\n<p style=\"text-align: justify;\">Download the executable for Windows and install it.<\/p>\n<p style=\"text-align: justify;\">You can verify its correct installation with the following PowerShell command:<\/p>\n<pre style=\"text-align: justify;\">Get-OdbcDriver | Where-Object Name -like \"HFSQL\"<\/pre>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/verifier_driver_hfsql_installe.png\" width=\"491\" height=\"166\" alt=\"\" class=\"wp-image-3066 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/verifier_driver_hfsql_installe.png 491w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/verifier_driver_hfsql_installe-480x162.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 491px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\">You can then simply interact with the driver using PowerShell. The following script allows you to test the connection to a remote HFSQL database <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?1000017310\" target=\"_blank\" rel=\"noopener\" title=\"HFSQL admin account\">using the default administrator account<\/a> which is <strong>admin<\/strong> <strong>without password<\/strong>.<\/p>\n<p style=\"text-align: justify;\">DSecBypass pentesters have made your work easier by using a built-in database, accessible by the HFSQL admin user, which allows you to execute SQL queries without necessarily knowing the name of the application databases.<\/p>\n<p>\n<script src=\"https:\/\/gist.github.com\/vtoutain\/67c79c86fac6363beb007b607edab514.js\"><\/script>\n<\/p>\n<p style=\"text-align: justify;\">The informed reader can extend this script to bruteforce authentication to the service, obviously on systems on which he has authorization.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/connect_local_hfsql_server-1024x480.png\" width=\"1024\" height=\"480\" alt=\"Execution of the Powershell script to authenticate to the HFSQL database\" class=\"wp-image-3075 aligncenter size-large\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/connect_local_hfsql_server-1024x480.png 1024w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/connect_local_hfsql_server-980x459.png 980w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/connect_local_hfsql_server-480x225.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Exploitation of HFSQL injections<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.dsecbypass.com\/en\/sqlmap-advanced-use\/\">SQLMap<\/a> knows how to detect HFSQL injection since the language remains relatively classic SQL. On the other hand, it will not be able to exploit it because it does not detect the DBMS and does not have certain functionalities to exploit it in a generic way. This typically results in SQLMap reporting an SQL injection, discovering the exploitation method (Error, Blind, Union etc), then eventually reporting that it is a false positive.<\/p>\n<p style=\"text-align: justify;\">During a <a href=\"https:\/\/www.dsecbypass.com\/en\/penetration-tests-pentest-security-audits-lyon\/\" title=\"IT security audit\">penetration test<\/a>, our pentester discovered an SQL injection in a WebDev application. This flaw, when it concerns HFSQL, becomes particularly sensitive: it allows an attacker to take advantage of the WLanguage language, which is an extension specific to the WinDev, WebDev and WinDev Mobile development environment.<\/p>\n<p style=\"text-align: justify;\">This interconnection between WebDev, HFSQL and WLanguage offers significant potential for application development. However, it also highlights the importance of proactive vulnerability management, particularly in the context of database security. This requires constant vigilance and appropriate security measures to ensure the integrity and confidentiality of stored data.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/HFSQLxWL.jpg\" width=\"271\" height=\"233\" alt=\"\" class=\"wp-image-3080 aligncenter size-full\"><\/p>\n<p style=\"text-align: justify;\">Please note, it is not automatic that the HFSQL user has access to WLanguage functions. So your SQL injection may not be able to use this exploitation technique. However, from experience, developers frequently give these rights to the application.<\/p>\n<p style=\"text-align: justify;\">Here is an example of an HFSQL query that uses a WLanguage function. To use them, simply prefix the function name with &#8220;WL.&#8221; :<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/exemple_hfsql_wl.png\" width=\"436\" height=\"78\" alt=\"Example of HFSQL query with WLanguage\" class=\"wp-image-3084 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/exemple_hfsql_wl.png 436w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/exemple_hfsql_wl-300x54.png 300w\" sizes=\"(max-width: 436px) 100vw, 436px\" \/><\/p>\n<p style=\"text-align: justify;\">All WLanguage functions are documented at the following link: <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/search2.awp?origin=browse&amp;cat=wlangage,249\" target=\"_blank\" rel=\"noopener\">https:\/\/doc.pcsoft.fr\/fr-FR\/search2.awp?origin=browse&amp;cat=wlangage,249<\/a>.<\/p>\n<p style=\"text-align: justify;\">Let&#8217;s go back to our SQL injection.<\/p>\n<p style=\"text-align: justify;\">The auditor had manually validated the presence of the injection:<\/p>\n<pre style=\"text-align: justify;\">\"test' or 1=1--\" renvoie l'ensemble des r\u00e9sultats\n\"test' or 1=2--\" ne renvoie aucun r\u00e9sultat<\/pre>\n<p style=\"text-align: justify;\">Of the &#8220;Union based&#8221; type, the injection made it possible to retrieve the result of the query which allows for example to obtain all the system environment variables using the &#8220;WL.SysEnvironment()&#8221; function:<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/sysenvironment.png\" width=\"868\" height=\"310\" alt=\"Using WLanguage to exploit an HFSQL injection\" class=\"wp-image-3090 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/sysenvironment.png 868w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/sysenvironment-480x171.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 868px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\">The payload is the following:<\/p>\n<pre style=\"text-align: justify;\">' union all select 85,85,WL.SysEnvironment()--<\/pre>\n<p style=\"text-align: justify;\">We can clearly see, in the application return, all the configured environment variables. Which, in certain contexts, can be very interesting.<\/p>\n<p style=\"text-align: justify;\">Depending on the configurations and HFSQL version, the ExeRun (<a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?3035006&amp;name=lanceappli_fonction\" title=\"LanceAppli (Fonction)\" target=\"_blank\" rel=\"noopener\">LanceAppli<\/a>) or <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?3035007&amp;name=lanceappliassociee_fonction\" title=\"LanceAppliAssoci\u00e9e (Fonction)\" target=\"_blank\" rel=\"noopener\">LanceAppliAssoci\u00e9e<\/a> functions can be used to execute Windows commands on the database server. A low-level function also allows you to interact with the dlls. Note that HFSQL restricts the accessible WLanguage functions, the reader will therefore have to discover which ones can be used.<\/p>\n<p style=\"text-align: justify;\">More broadly, the WLanguage functions in the &#8220;<a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/search2.awp?origin=browse&amp;cat=fonctions-gestion-windows,486\" target=\"_blank\" rel=\"noopener\" title=\"pentest hfsql webdev\">Windows management WLanguage functions<\/a>&#8221; section should be tested as part of an intrusion test, in particular the <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?3035005&amp;name=Fonctions%20Ex%C3%A9cutables\" target=\"_blank\" id=\"zrl_15_LIEN_TITRE\" class=\"TitreZR wblien padding\" rel=\"noopener\">Executable Functions<\/a>, <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?3073010&amp;name=Fonctions%20Syst%C3%A8me\" target=\"_blank\" id=\"zrl_34_LIEN_TITRE\" class=\"TitreZR wblien padding\" rel=\"noopener\">System Functions<\/a> and <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?3066001&amp;name=Fonctions%20R%C3%A9seaux\" target=\"_blank\" id=\"zrl_32_LIEN_TITRE\" class=\"TitreZR wblien padding\" rel=\"noopener\">Network Functions<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Replication of a WebDev + HFSQL environment locally<\/h2>\n<p style=\"text-align: justify;\">In order to study and better understand the security of applications developed on WinDev\/WebDev it may be interesting to create a local test environment.<\/p>\n<p style=\"text-align: justify;\">To do this, you just need a Windows virtual machine and <a href=\"https:\/\/pcsoft.fr\/st\/telec\/webdev28\/index.html\" target=\"_blank\" rel=\"noopener\">install the WebDev environment<\/a> (including HFSQL and IIS which will be offered to you during installation). The VM prerequisites are available at the following link: <a href=\"https:\/\/doc.pcsoft.fr\/?2036002\" target=\"_blank\" rel=\"noopener\">https:\/\/doc.pcsoft.fr\/?2036002<\/a>.<\/p>\n<p style=\"text-align: justify;\">To test the execution of WLanguage functions from HFSQL, once all the components have been installed, add a new user using the WebDev Hosting Control Center by granting him all rights to the database, in particular the &#8220;Right to execute stored procedures&#8221;.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_Centre_Controle_hebergement_WEBDEV.png\" width=\"922\" height=\"310\" alt=\"\" class=\"wp-image-3096 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_Centre_Controle_hebergement_WEBDEV.png 922w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_Centre_Controle_hebergement_WEBDEV-480x161.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 922px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/Centre_Controle_hebergement_WEBDEV_droit_execution_procedure_stockee_pour_WL.png\" width=\"904\" height=\"721\" alt=\"\" class=\"wp-image-3098 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/Centre_Controle_hebergement_WEBDEV_droit_execution_procedure_stockee_pour_WL.png 904w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/Centre_Controle_hebergement_WEBDEV_droit_execution_procedure_stockee_pour_WL-480x383.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 904px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\">Then check that you can execute the WL functions using the HFSQL client configured with the user thus created:<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_execute_WL_in_SQL.png\" width=\"906\" height=\"649\" alt=\"\" class=\"wp-image-3100 aligncenter size-full\" srcset=\"https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_execute_WL_in_SQL.png 906w, https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2023\/10\/User_test_execute_WL_in_SQL-480x344.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 906px, 100vw\" \/><\/p>\n<p style=\"text-align: justify;\">Numerous possibilities for research into the security of the WinDev\/WebDev environment exist: analyzing communications between the HFSQL client and the server, analyzing the security of WLanguage functions (fuzzing of parameters for example), studying the possibilities of privilege escalation locally, and many others.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>What about the recommendations?<\/h2>\n<p style=\"text-align: justify;\">In order to deploy WebDev applications with HFSQL in the best security conditions, the following advices can be considered:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Implement PC SOFT security recommendations: <a href=\"https:\/\/doc.pcsoft.fr\/fr-FR\/?1000017310\" target=\"_blank\" rel=\"noopener\">https:\/\/doc.pcsoft.fr\/fr-FR\/?1000017310<\/a><\/li>\n<li style=\"text-align: justify;\">Make sure you have a complex password for the HFSQL Admin account<\/li>\n<li style=\"text-align: justify;\">Use system users who have restricted rights<\/li>\n<li style=\"text-align: justify;\">Grant only the strictly necessary rights to the HFSQL user<\/li>\n<li style=\"text-align: justify;\">Expose HFSQL network services only to hosts and networks that need access to them<\/li>\n<li style=\"text-align: justify;\">Use <a href=\"https:\/\/doc.pcsoft.fr\/?2032032\" title=\"HFSQL injection prevention with parameterized queries\" target=\"_blank\" rel=\"noopener\">parameterized HFSQL queries<\/a> when you need to build a query from data that comes from the frontend<\/li>\n<li style=\"text-align: justify;\">Use the WLanguage HTMLVersTexte() function to protect against XSS<\/li>\n<li style=\"text-align: justify;\">Train your developers in secure development best practices<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: justify;\"><span>\ud83d\udee1\ufe0f DSecBypass supports you in the <a href=\"https:\/\/www.dsecbypass.com\/en\/website-pentest\/\" title=\"Website penetration test\">security audit of your web applications<\/a> as well as in training developers in good security practices. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\">contact <\/a>us for additional information and\/or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article aims to share the results of our experience of penetration tests carried out on websites built with WebDev and the HFSQL database. It is written for pentesters and security researchers who wish to study the security of these technologies, but also for curious developers. We will see in particular the possibilities offered by HFSQL in the event of SQL injections, how to authenticate on an accessible HFSQL service, as well as the replication of a local WebDev environment to study its security.<\/p>\n","protected":false},"author":4,"featured_media":3042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-3121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=3121"}],"version-history":[{"count":22,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3121\/revisions"}],"predecessor-version":[{"id":3633,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3121\/revisions\/3633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/3042"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=3121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=3121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=3121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}