lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000101c3073e$fa88ec30$9587763e@user1>
Date: Sun, 20 Apr 2003 17:15:51 +0400
From: "drG4njubas" <drG4nj@...l.ru>
To: <bugtraq@...urityfocus.com>
Subject: MPCSoftWeb Guest Book vulnerabilities.


Date:
20.04.2003

Subject:
MPCSoftWeb Guest Book vulnerabilities.

Description:
This Guest Book is designed to be easy to use and configure, 
it uses a Microsoft Access 2000 database to store the messages. 
It has a number of features: emoticons and text formatting, 
a profanity or unwanted word filter, which can be modified as required,
images can be used in the Guest Book, e-mail notification of Guest 
Book entries, COOKIES can be used by the Guest Book administrator. 

Vendor:
www.mpcsoftweb.co.uk

Vulnerability:
insertguest.asp neglects filtering user input allowing 
for script injection to the guestbook via "Name",
"location" and "comment" fields. The injected 
script will be executed in anyones browser who visits the 
guestbook.

An attaker may download MS Acces database to gain 
administrator's password, which is not encrypted at all.
Example:
http://www.target.com/mpcsoftweb_guestbook/database/mpcsoftweb_guestdata
.mdb

Vulnerability discovered by Black Tigerz Research Group
We are:Areus,Barracuda,n1Tr0f4n,Velzevol,n3ch,drG4njubas.
Please visit our website: http://www.blacktigerz.org 

Our team needs more members, please drop a mail to 
membership@...cktigerz.org for more information.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ