This is a functional SQL injection exploit for Tickets 2.13 that leverages a UNION-based attack to write a PHP shell to the web root, enabling remote command execution. The PoC automates the attack via an auto-submitting HTML form.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Tickets 2.13
No auth needed
Prerequisites:MySQL database with file write permissions · Access to the target's web server directory