The exploit demonstrates SQL injection vulnerabilities in mySurvey 1.0 via multiple GET parameters (id) in statistic.php, question.php, and edit_live.php. It includes payloads for boolean-based blind, time-based blind, and UNION-based SQLi attacks.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:mySurvey 1.0
No auth needed
Prerequisites:Access to the vulnerable web application