Looks like another hole different from mine. But yes, all you need is time on your hand to drop all the info from his database down to the last password. If I had more time I'd definitely go through the injection and keep sending SQL requests till I find something that'll genuinely scare him, but I figured only finding the link would be enough for him. I don't think he understands the danger of an SQL injection.
Yes, he doesn't understand that.
I can send commands to the SQL, but I can't get data back.
I've been writing web applications for a long time and certainly understand the risk of SQL injections aka the simplest exploit out there.
However, it does appear that I neglected to correctly escape user-entered BTC addresses in this one case (ie the attack vector pointed out by BilalHIMITE). I have just fixed the issue: https://github.com/TeamEmpireCoin/empirecoin-web/commit/8cdd84c68e5cba5f6ad84489d917943bfc81a07c
BilalHIMITE, please post or PM me your bitcoin address to receive the 0.1 BTC bounty.
15YnqdubKqeq3v7RVaV38Qk7FrvLpvZ5vG
Sended a PM also.