This is a technical writeup describing a SQL injection vulnerability in JonhCMS 4.5.1. The vulnerable parameter is 'id' in the 'go.php' file, and the exploit leverages improper input sanitization in a MySQL query.
Classification
Writeup 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:JonhCMS 4.5.1
No auth needed
Prerequisites:Access to the vulnerable 'go.php' endpoint