This exploit demonstrates a SQL injection vulnerability in Oriol Espinal CMS 1.0 via the 'id' parameter and a file upload vulnerability allowing arbitrary PHP file upload. The SQLi uses union-based injection, while the file upload bypasses restrictions to achieve RCE.
Classification
Working Poc 90%
Attack Type
Sqli | Rce
Complexity
Trivial
Reliability
Reliable
Target:Oriol Espinal CMS 1.0
No auth needed
Prerequisites:Access to the target web application · Ability to send HTTP requests to the vulnerable endpoints