This exploit demonstrates a SQL injection vulnerability in Simple Chat System 1.0 via the 'id' parameter in chatroom.php. The PoC includes a crafted payload to extract database information, confirming the vulnerability.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Simple Chat System 1.0
No auth needed
Prerequisites:Access to the target web application