This exploit demonstrates a SQL injection vulnerability in MindSculpt's C[M]S™ Content Management System via the 'subj' parameter. The PoC uses a UNION-based SQL injection to extract username and hashed password from the 'users' table.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:MindSculpt C[M]S™ Content Management System
No auth needed
Prerequisites:Access to the vulnerable web application