The exploit demonstrates a SQL injection vulnerability in FreznoShop 1.3.0 via the 'id' parameter in 'product_details.php'. It includes a functional payload to extract database information such as user, version, and database name.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FreznoShop 1.3.0
No auth needed
Prerequisites:Access to the vulnerable 'product_details.php' endpoint