This exploit demonstrates a SQL injection vulnerability in Fantastic Blog CMS 1.0 via the 'id' parameter in 'single.php' and 'category.php'. The PoC includes URL-encoded SQL payloads that extract database information using UNION-based injection.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Fantastic Blog CMS 1.0
No auth needed
Prerequisites:Access to the target web application