The document details a SQL injection vulnerability in Forum Oxalis 0.1.2, where the 'id' parameter in 'forum.php' is directly used in a SQL query without sanitization. The proof-of-concept URL demonstrates the vulnerability by injecting a UNION-based SQL query to retrieve the database version.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Forum Oxalis 0.1.2
No auth needed
Prerequisites:Access to the vulnerable web application