This exploit demonstrates a SQL injection vulnerability in Meme Maker Script 2.1, allowing an attacker to extract sensitive information from the database via a crafted URL parameter. The payload uses MySQL-specific functions like `export_set` to enumerate table and column names.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:Meme Maker Script 2.1
No auth needed
Prerequisites:Access to the vulnerable endpoint · MySQL database backend