This exploit demonstrates a SQL injection vulnerability in De-Tutor 1.0, where the 'id' parameter in 'blog-details.php' is directly interpolated into a SQL query without sanitization. The PoC includes a crafted payload that extracts database schema information via error-based SQLi techniques.
Classification
Working Poc 95%
Target:
De-Tutor - Private Tutoring and Admission Processing 1.0
No auth needed
Prerequisites:
Access to the vulnerable endpoint · SQL injection payload