[<prev] [next>] [day] [month] [year] [list]
Message-ID: <00bd01c512b6$592916a0$0100a8c0@server>
Date: Mon, 14 Feb 2005 17:58:02 +0100
From: "CorryL" <corryl@...overde.com>
To: <bugtraq@...urityfocus.com>
Cc: full-disclosure@...ts.netsys.com
Subject: ASPjar Guestbook login.asp not official patch
..::x0n3-h4ck.org Italian Security Team::..
ASPjar Guestbook login.asp not official patch
Application: Aspjar Guestbook
Version: 1.0
Bug: Sqj injection
Vendor : not attainable
DETAILS
Supply in the password field ' or ''=', this should allow you to bypass
the authentication process used by ASPjar Guestbook.
Patch:
This is patch created by Expanders from x0n3-h4ck Italian Security Team.
Find in the file admin\login.asp this is string:
strSql ="SELECT * from admin where Name = '" & Request.Form("User") & "' and
password = '" & Request.Form("Password") &"'"
you replace with:
strSql ="SELECT * from admin where Name = '" &
replace(Request.Form("User"),"'","") & "' and password = '" &
replace(Request.Form ("Password"),"'","") &"'"
For Info www.x0n3-h4ck.org
CorryL
corryl80@...il.com
www.x0n3-h4ck.org
_________________________________
www.seekstat.it is your web stat
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists