This exploit demonstrates an error-based SQL injection vulnerability in Dolphin 7.3.0, where the `key` parameter in `flash/XML.php` is not properly escaped, allowing an attacker to extract sensitive information such as passwords from the database.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Dolphin 7.3.0
No auth needed
Prerequisites:Access to the vulnerable endpoint · Dolphin 7.3.0 installation