The exploit demonstrates a SQL injection vulnerability in HasanMWB 1.0 via the 'id' parameter in 'index.php'. It includes both Python and Perl scripts to automate the exploitation, retrieving user credentials from the database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:HasanMWB 1.0
No auth needed
Prerequisites:Network access to the target web application