The exploit demonstrates a SQL injection vulnerability in SiAdmin 1.1 via the 'id' parameter in two endpoints. It includes functional payloads that extract database information, confirming the vulnerability's exploitability.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:SiAdmin 1.1
No auth needed
Prerequisites:Access to the vulnerable web application