The exploit demonstrates SQL injection vulnerabilities in B2B Script v4.27 via the 'keywords' and 'token' parameters in search.php and catcompany.php, respectively. It includes payloads for boolean-based blind, time-based blind, and UNION-based SQL injection attacks.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:B2B Script v4.27
No auth needed
Prerequisites:Access to the vulnerable web application