This exploit demonstrates a SQL injection vulnerability in @CMS 2.1.1 via the 'article_id' and 'cat_id' parameters in readarticle.php and articles.php, respectively. The PoC uses a UNION-based SQL injection to extract user credentials from the 'atcms_users' table.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:@CMS 2.1.1
No auth needed
Prerequisites:Access to the vulnerable web application