This exploit demonstrates a SQL injection vulnerability in Sahana Agasti <= 0.6.4 via the 'sel' parameter in xml.php. The PoC extracts user credentials by injecting a UNION-based SQL query.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Sahana Agasti <= 0.6.4
No auth needed
Prerequisites:Access to the target URL · SQL injection vulnerability in the 'sel' parameter