This is a functional SQL injection exploit for Bizon-CMS V2.0, targeting the 'index.php' page via the 'Page' and 'Id' parameters. The PoC demonstrates a UNION-based SQLi to extract database information such as user, database name, and version.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Bizon-CMS V2.0
No auth needed
Prerequisites:Access to the vulnerable Bizon-CMS instance · SQL injection vulnerability in the 'index.php' page