The exploit demonstrates a SQL injection vulnerability in iTech Job Script 9.27 via the 'id' parameter in Employer_Details.php and Job_Details.php. The PoC includes a crafted SQL payload that extracts table and column names from the database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:iTech Job Script 9.27
No auth needed
Prerequisites:Access to the vulnerable web application