This exploit demonstrates SQL injection vulnerabilities in 'The Don 1.0.1' via the 'login' and 'email' parameters in two separate endpoints. The payloads use URL-encoded SQL syntax to perform a UNION-based attack, extracting data from the database.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:The Don 1.0.1
No auth needed
Prerequisites:Access to the target web application