lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060201201016.1969.qmail@securityfocus.com> Date: 1 Feb 2006 20:10:16 -0000 From: alex@...ln.com To: bugtraq@...urityfocus.com Subject: [eVuln] Vanilla Guestbook Multiple XSS & SQL Injection Vulnerabilities New eVuln Advisory: Vanilla Guestbook Multiple XSS & SQL Injection Vulnerabilities http://evuln.com/vulns/54/summary.html --------------------Summary---------------- Software: Vanilla Guestbook Sowtware's Web Site: http://tachyondecay.net/ Versions: 1.0 Beta Critical Level: Moderate Type: Multiple Vulnerabilities Class: Remote Status: Unpatched Exploit: Not Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0054 -----------------Description--------------- Most of user defined data isn't properly sanitized. This can be used to make any SQL query by injecting arbitrary SQL code or insert any javascript code (when posting new messages). --------------Exploit---------------------- Waiting for developer(s) reply. If there is no reply exploitation code will be published in 10 days http://evuln.com/vulns/54/exploit.html --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)