This is a Perl-based SQL injection exploit targeting Flirt Matching SMS System. It leverages a vulnerable 'id' parameter in the guestbook feature to extract user credentials (password hashes) from the database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Flirt Matching SMS System (version not specified, likely <= 2010)
No auth needed
Prerequisites:Target URL with vulnerable 'index.php?site=guestbook&id=' endpoint