Re: [sqlmap-users] Blind SQL Injection question

2013-05-23 Thread Chris Oakley
Hi Guy This is indeed a valid vulnerability. If we take the following request: POST /trk/lpg/index.php HTTP/1.1 Host: myimg.co Cookie: PHPSESSID=yourID from_date=2013-05-21&to_date=2013-05-23&campaign_id=11'5*CA-PTV*Keyword*&crap=&submit=submit&stage=2 Then we receive a response which

[sqlmap-users] Blind SQL Injection question

2013-05-23 Thread Guy Dufour
My script is installed on http://myimg.co/trk/lpg/ login " admin ", password " hello " A security advisor told me that it's injectable while being logged in manually by modifying the POST param "campaign_id" Example: Change " 129*US-LP-PPV*PPV* " to : 129 and ascii(substring((SELECT datab