The provided text describes an SQL injection vulnerability in PonVFTP, where insufficient sanitization of user-supplied data allows attackers to manipulate SQL queries. The example payload ('or' 1=1) demonstrates a basic SQLi technique to bypass authentication.
Classification
Writeup 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:PonVFTP (version unspecified)
No auth needed
Prerequisites:Access to the vulnerable PonVFTP application