This exploit demonstrates SQL injection vulnerabilities in Grid Pro Big Data 1.0 via multiple POST parameters in 'test.php'. It includes UNION-based and time-based blind SQLi payloads targeting the 'on_home', 'params[0][value]', and 'params[0][name]' parameters.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Grid Pro Big Data 1.0
No auth needed
Prerequisites:Access to the vulnerable 'test.php' endpoint