The exploit demonstrates SQL injection vulnerabilities in SchoolDir software via two endpoints: 'search' and 'sortsearch'. The attack involves injecting malicious SQL queries through the 'searchItem' and 'School_type' parameters, respectively.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:SchoolDir (version not specified)
No auth needed
Prerequisites:Access to the vulnerable web application