lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060209220605.23199.qmail@securityfocus.com> Date: 9 Feb 2006 22:06:05 -0000 From: alex@...ln.com To: bugtraq@...urityfocus.com Subject: [eVuln] Unknown Domain Shoutbox multiple XSS & SQL Injection Vulnerabilities New eVuln Advisory: Unknown Domain Shoutbox multiple XSS & SQL Injection Vulnerabilities http://evuln.com/vulns/55/summary.html --------------------Summary---------------- eVuln ID: EV0055 CVE: CVE-2006-0605 CVE-2006-0606 Software: Shoutbox Sowtware's Web Site: http://www.unknowndomain.co.uk/ Versions: 2005.07.21 Critical Level: Moderate Type: Multiple Vulnerabilities Class: Remote Status: Unpatched Exploit: Not Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) -----------------Description--------------- Most of user defined data isn't properly sanitized. This can be used to make any SQL query by injecting arbitrary SQL code (authorization or viewing blog and forum) or insert any javascript code (when posting new messages). Condition for SQL Injections: magic_quotes_gpc - off --------------Exploit---------------------- Waiting for developer(s) reply. If there is no reply exploitation code will be published in 10 days http://evuln.com/vulns/55/exploit.html --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)