This exploit demonstrates a SQL injection vulnerability in FS OLX Clone via the 'catg_id' parameter in the search-result.php page. The PoC includes a boolean-based blind SQLi payload that can be used to confirm the vulnerability.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FS OLX Clone (version as of 23 October 17)
No auth needed
Prerequisites:Access to the target web application · Network connectivity to the target