This exploit demonstrates SQL injection vulnerabilities in Easy Support Tools v1.0 via the 'stt' parameter in multiple PHP files (faq.php, support.php, blog.php). The PoC uses the 'extractvalue' function to leak database version information.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Easy Support Tools v1.0
No auth needed
Prerequisites:Access to vulnerable web application · SQL injection payload