This exploit demonstrates a boolean-based blind SQL injection vulnerability in the 'id' parameter of the FS Monster Clone software. The PoC shows how an attacker can inject SQL queries via the GET parameter in Job_Details.php.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FS Monster Clone (24 October 17)
No auth needed
Prerequisites:Access to the vulnerable web application