This is a SQL injection proof-of-concept for FS Crowdfunding Script, targeting the 'id' parameter in a GET request. The payload demonstrates a boolean-based blind SQLi vulnerability in the 'page_running_projects_details.php' endpoint.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FS Crowdfunding Script (24 October 17)
No auth needed
Prerequisites:Access to the vulnerable endpoint · Target application running FS Crowdfunding Script