This exploit demonstrates a SQL injection vulnerability in inClick Cloud Server 5.0 via the 'site_id' parameter in the client.php page. The PoC includes a crafted SQL query that extracts table and column names from the information_schema database.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:inClick Cloud Server 5.0
No auth needed
Prerequisites:Access to the vulnerable client.php endpoint