This exploit demonstrates SQL injection vulnerabilities in Wecodex Store Paypal 1.0 via the 'id' parameter in the signIn endpoint. It includes boolean-based and time-based blind SQLi payloads.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Wecodex Store Paypal 1.0
No auth needed
Prerequisites:Access to the signIn endpoint of the target application