This exploit demonstrates SQL injection vulnerabilities in Mess Management System 1.0 via two endpoints: an unauthenticated GET request and an authenticated POST request. The payloads use UNION-based SQLi to extract database information.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Mess Management System 1.0
No auth needed
Prerequisites:Access to the target web application