This exploit demonstrates a SQL injection vulnerability in anecms by manipulating the 'username' POST parameter during registration. The PoC shows how injecting a single quote can break the SQL query, confirming the vulnerability.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:anecms (all versions)
No auth needed
Prerequisites:Access to the registration page of anecms