The exploit demonstrates a SQL injection vulnerability in Yot CMS 3.3.1 via the 'aid' and 'cid' parameters. It uses a UNION-based SQLi technique to extract database schema information, including table and column names, by leveraging MySQL session variables and string concatenation.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target:Yot CMS 3.3.1
No auth needed
Prerequisites:Access to the target web application · MySQL database backend