This exploit demonstrates SQL injection vulnerabilities in FS IMDB Clone via the 'id' GET parameter, including boolean-based blind, error-based, and UNION query techniques. The payloads are functional and target MySQL databases.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FS IMDB Clone (2017-12-06)
No auth needed
Prerequisites:Access to the vulnerable web application · MySQL database backend