This exploit demonstrates a SQL injection vulnerability in WebVet 0.1a via the 'id', 'lastname', and 'patient' parameters in client.php. The PoC uses UNION-based SQLi to extract database schema information.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:WebVet 0.1a
No auth needed
Prerequisites:Access to the client.php endpoint · Database with information_schema tables