This entry describes a SQL injection vulnerability in Webspell 4.X due to a bypass in the `safe_query` function. The exploit leverages URL-encoded SQL syntax to bypass input sanitization.
Classification
Writeup 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Webspell 4.X
No auth needed
Prerequisites:Access to the vulnerable web application