This exploit demonstrates a SQL injection vulnerability in Zechat 1.5 via the 'uname' parameter in profile.php. The payload uses UNION-based SQLi to extract table and column names from the information_schema database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Zechat 1.5
No auth needed
Prerequisites:Access to the vulnerable profile.php endpoint