The exploit demonstrates SQL injection vulnerabilities in Weyal CMS by injecting malicious SQL queries via the 'id' and 'countryid' parameters. It retrieves database metadata such as version, user, and database name.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Weyal CMS
No auth needed
Prerequisites:Access to the vulnerable Weyal CMS application