# Exploit Title: Mushoq websites get SQL injection # Google Dork: inurl:"index.php?idSeccion=" # Vulnerable parameter : idSeccion # Date: 29-11-2015 # Exploit Author: Timoumi Houcem # Contact: www.facebook.com/houcem.radikali # Version: all versions # Tested on: kali linux OS,iceweasel browser # EXAMPLE : http://www.briggs.com.ec/index.php?idSeccion=21 # EXPLOIT : all websites powered by mushoq company are vulnerable to sql injection by GET method, some websites are protected by WAF, but we can bypass it and dump databases.