This exploit demonstrates SQL injection vulnerabilities in FS Shaadi Clone via the 'token' GET parameter. It includes payloads for boolean-based blind, time-based blind, and UNION-based SQL injection attacks.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:FS Shaadi Clone (version 2017-12-05)
No auth needed
Prerequisites:Access to the target application's view_profile.php endpoint