[原文]SQL injection vulnerability in Default.asp in EzASPSite 2.0 RC3 and earlier allows remote attackers to execute arbitrary SQL commands and obtain the SHA1 hash of the admin password via the Scheme parameter.
EzASPSite contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the Default.asp script not properly sanitizing user-supplied input to the 'Scheme' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.