This exploit demonstrates a SQL injection vulnerability in The Car Project 1.0 via the 'car_id' parameter. The PoC includes a crafted SQL query that extracts database information such as user, database name, and version.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:The Car Project 1.0
No auth needed
Prerequisites:Access to the vulnerable web application