This exploit demonstrates a SQL injection vulnerability in QWERTY CMS lite via the 'id' parameter in index.php. The provided payload extracts data from the administrator table, including password hashes, without requiring authentication.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:QWERTY CMS lite
No auth needed
Prerequisites:Access to the target URL with the vulnerable parameter