# Exploit Title: Mushoq websites get SQL injection
# Google Dork: inurl:"index.php?idSeccion="
# Vulnerable parameter : idSeccion
# Date: 29-11-2015
# Exploit Author: Timoumi Houcem
# Contact: www.facebook.com/houcem.radikali
# Version: all versions
# Tested on: kali linux OS,iceweasel browser
# EXAMPLE : http://www.briggs.com.ec/index.php?idSeccion=21
# EXPLOIT :
all websites powered by mushoq company are vulnerable to sql injection by GET method, some websites are protected by WAF, but we can bypass it and dump databases.