The exploit demonstrates a SQL injection vulnerability in ImageBay 1.0, allowing an attacker to inject SQL commands via the 'pid' parameter in 'picture.php' and the 'id' parameter in 'updaterate.php'. The provided payload extracts user credentials (username and password) from the 'users' table.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:ImageBay 1.0
No auth needed
Prerequisites:Access to the vulnerable web application