This exploit demonstrates an authenticated SQL injection vulnerability in Webtareas 2.0 via the 'id' parameter in a POST request. The proof-of-concept includes SQLmap output confirming boolean-based and time-based blind SQL injection techniques.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Webtareas v2.0
Auth required
Prerequisites:Authenticated session · Access to the vulnerable endpoint