This exploit demonstrates a SQL injection vulnerability in ARASTAR CMS by manipulating the 'ID' parameter in the 'cat.php' file. The PoC provides a direct URL injection point and confirms the vulnerability's presence across all versions.
Classification
Working Poc 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:ARASTAR CMS (all versions)
No auth needed
Prerequisites:Access to the vulnerable 'cat.php' endpoint