[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000001c2fb52$bbbe34d0$d987763e@user1>
Date: Sat, 5 Apr 2003 13:07:05 +0400
From: "drG4njubas" <drG4nj@...l.ru>
To: <bugtraq@...urityfocus.com>
Subject: SignHere guestbook vulnerability.
This advisory nd other useful files
can be found at www.blacktigerz.org
Subject:
SignHere guestbook vulnerability.
Description:
Free, easy-to-use guestbook. Main features are: message text
formatting (bold text, urls etc.); inserting smiles as icons;
web-based administration; email notifications about new posts.
Also html output is optimized to maximize download speed.
Vendor:
Bitstrike software.
http://www.bitstrike.com
Vulnerability:
Default.asp neglects filtering user input allowing
for script injection to the guestbook via "Email"
field. The injected script will be executed in
anyones browser who visits the guestbook.
____________________________
Best Regards, drG4njubas
Black Tigerz Research Group
http://www.blacktigerz.org
Powered by blists - more mailing lists