The exploit demonstrates SQL injection vulnerabilities in LiveSupport 1.0 via crafted HTTP requests. It includes specific payloads targeting parameters like 'Ticket[queue_id]' and 'id' to extract database information.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:LiveSupport 1.0
No auth needed
Prerequisites:Access to the target web application