Reaching the page, we are facing a login page.
Let's start with some basic SQL injection.
The website is reacting to the JavaScript that I've putted in the form. Checking the cookie parameter in the Developer Tools, the field "HttpOnly" is set to false. In that case, it allows an attacker to retrieve a user cookie using the JavaScript method "document.cookie".
To find "HttpOnly" parameter, access to the Developer Tools by clicking on F12 then go to storage, find the cookie and in the right panel, you should have the cookie data where you find creation date, domain, HttpOnly...
This script will redirect any user who reach our ticket page to my Pipedream endpoint and set the field cookie with their own cookie thanks to the JavaScript function document.cookie.
On the screenshot above, the field cookie has been filled by the user's cookie who reach my ticket page. Therefore, copy pasting this value and replacing our cookie with this value should give us access to his session if there is not other security measure.
To replace our cookie, access to the Developement Tools, go to storage, click cookie and paste the value. Once it is done, refresh the page, and see if the session has changed.
Yes! The page content has changed and if you look closely the flag is here as well.