lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 5 Mar 2007 18:59:13 +0200 (EET) From: bugtraq@...sec.com To: bugtraq@...urityfocus.com Subject: Sava's GuestBook Multiple Vulnerabilities New Advisory: Sava's GuestBook Multiple Vulnerablities http://belsec.com/advisories/142/summary.html --------------------Summary---------------- Belsec ID: BS0002 Software: Sava's GuestBook Sowtware's Web Site: http://savasplace.com Versions: 23.11.2006 Critical Level: Moderate Type: Multiple Vulnerabilities Class: Remote Status: Unpatched PoC/Exploit: Not Available Solution: Not Available Discovered by: Belsec Team -----------------Description--------------- 1. SQL Injection. Vulnerable script: add2.php Parameters 'name', 'country', 'email', 'website', 'message' is not properly sanitized before being used in SQL query. This can be used to make SQL queries by injecting arbitrary SQL code. Condition: magic_quotes_gpc = off 2. Cross-Site Scripting. Vulnerable Script: add2.php Parameter 'name', 'country', 'email', 'website' is not properly sanitized. This can be used to post arbitrary HTML or web script code. --------------PoC/Exploit---------------------- Waiting for developer(s) reply. --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Belsec Team Regards, Belsec Team http://belsec.com
Powered by blists - more mailing lists