This exploit demonstrates a SQL injection vulnerability in the 'sticker.php' script of the 2Capsule Sticker application. The PoC provides a UNION-based SQLi payload to extract data from the database.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:2Capsule Sticker (version unspecified)
No auth needed
Prerequisites:Access to the vulnerable 'sticker.php' endpoint