lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060118200025.9858.qmail@securityfocus.com> Date: 18 Jan 2006 20:00:25 -0000 From: alex@...ln.com To: bugtraq@...urityfocus.com Subject: [eVuln] eggblog Multiple SQL Injection & XSS Vulnerabilities New eVuln Advisory: eggblog Multiple SQL Injection & XSS Vulnerabilities http://evuln.com/vulns/39/summary/bt/ --------------------Summary---------------- Software: eggblog Sowtware's Web Site: http://www.epicdesigns.co.uk/projects/eggblog Versions: 2.0 Critical Level: Moderate Type: Multiple Vulnerabilities Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0039 -----------------Description--------------- Most of user defined data isn't properly sanitized. This can be used to make any SQL query by injecting arbitrary SQL code (authorization or viewing blog and forum) or insert any javascript code (when posting new messages). --------------Exploit---------------------- Available at: http://evuln.com/vulns/39/exploit/bt/ --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)