This exploit demonstrates a SQL injection vulnerability in Clicksor's index.php, allowing an attacker to extract user credentials via a UNION-based SQLi attack. The PoC provides a specific query to dump usernames and passwords from the parapara_copp1.jos_users table.
Classification
Working Poc 90%
Target:
Clicksor (version unspecified)
No auth needed
Prerequisites:
Target running vulnerable Clicksor software with exposed index.php