[<prev] [next>] [day] [month] [year] [list]
Message-ID: <44D28380.8060804@gmx.net>
Date: Fri, 04 Aug 2006 00:15:12 +0100
From: Tamriel <tamriel@....net>
To: bugtraq@...urityfocus.com
Subject: GaesteChaos <= 0.2 Multiple Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: GaesteChaos <= 0.2 Multiple Vulnerabilities
Release Date: 2006/08/04
Last Modified: 2006/08/03
Author: Tamriel [tamriel at gmx dot net]
Application: GaesteChaos <= 0.2
Risk: Moderate
Vendor Status: not contacted
Vendor Site: www.chaossoft.de
Overview:
Quote from www.chaossoft.de:
"GaesteChaos ist ein Gaestebuch für Ihre Homepage. Es
ist klein und kompakt in PHP geschrieben und benutzt
mySQL, um die Daten abzuspeichern."
Details:
1) In the eintragen.php are some possible cross site scripting
vulnerabilities.
This can be used to insert malicious code that will be executed
on the client's machine.
The input fields "gastname" and "gastwohnort" will be not checked
by this script.
2) SQL Injection Vulnerabilities in eintragen.php
(arround line 35-45)
...
mysql_db_query($database, "INSERT INTO $tabellekommentar SET
eintragid = '$komwelches', name = '$gastname',email = '$gastemail',
wohnort = '$gastwohnort', datum ='$timestamp', ip = '$tempip',
host = '$hosti', homepage = '$gasthomepage', eintrag =
'$gasteintrag',
geschlecht = '$geschlechti'");
...
Solution:
Take a view on PHP's htmlentities and mysql_real_escape_string
functions.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
iD8DBQFE0oOAqBhP+Twks7oRAgmaAJ9QB4jc4+tOujEx9dn0dbx0Ozbd9wCfav44
hL3gWUSOnSxPhKi75BB8aKs=
=X8Vo
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists