lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000201c2f9ea$1567c1a0$4b80763e@user1>
Date: Thu, 3 Apr 2003 18:05:22 +0400
From: "drG4njubas" <drG4nj@...l.ru>
To: <bugtraq@...urityfocus.com>
Subject: Sakki's guestbook V.1.01 script injection vulnerability.


This advisory can be found at www.blacktigerz.org.

Description:
Easy to manage and configure asp powered guestbook.
Works with MS Access database or without it.

Vendor:
http://www.sakki.net

Vulnerability:
gb.asp neglects filtering user input allowing for script injection to
the guestbook via 
"name" , "city/state" and "own url" fields. The injected script will be
executed in anyones 
browser who visits the guestbook.
____________________________
Best Regards,   drG4njubas
Black Tigerz Research Group
http://www.blacktigerz.org



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ