In one of my projects I discovered a blind-sql-injection vulnerability, that goes like this:
the url index.php/company/lang/action can be injected with some extra sql like this index.php/company'%20and%20''='/lang/action
the only thing I've found the attacker can do is to sleep the server, eg. index.php/company'%20and%200=sleep(100)%20and%20'1'='1/lang/action
What could be other options for the attacker?
Thanks