The exploit demonstrates SQL injection vulnerabilities in B2B Marketplace Script v2.0 via the 'cl_id' and 'pro_id' parameters in the 'ajax.php' file. It provides specific URLs with injectable parameters, indicating a functional proof-of-concept for SQLi.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:B2B Marketplace Script v2.0
No auth needed
Prerequisites:Access to the target web application