This exploit demonstrates a SQL injection vulnerability in Woodall Creative's software, allowing attackers to extract database information via crafted input in the 'id' parameter. The provided example query confirms the vulnerability by retrieving the database version.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Woodall Creative Group (version unspecified)
No auth needed
Prerequisites:Access to a vulnerable Woodall Creative Group installation