This exploit demonstrates a SQL injection vulnerability in MMHAQ CMS, allowing an attacker to extract database version information via a crafted URL parameter. The PoC can be extended to dump sensitive data such as admin credentials.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:MMHAQ CMS (version not specified)
No auth needed
Prerequisites:Access to the target web application