This exploit demonstrates a SQL injection vulnerability in dotProject 2.1.5, where the 'ticket' parameter in the URL is not properly sanitized, allowing an attacker to extract sensitive information such as user credentials and database details.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:dotProject 2.1.5
No auth needed
Prerequisites:Access to the vulnerable dotProject instance