lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1298018179.25136.0.camel@linux-9ovm.site> Date: Fri, 18 Feb 2011 10:36:19 +0200 From: Aliaksandr Hartsuyeu <bt@...ln.com> To: full-disclosure@...ts.grok.org.uk Subject: www.eVuln.com : "wsnuser" Cookie SQL Injection vulnerability in WSN Guest www.eVuln.com advisory: "wsnuser" Cookie SQL Injection vulnerability in WSN Guest -----------Summary----------- http://evuln.com/vulns/174/summary.html eVuln ID: EV0174 Software: WSN Guest Vendor: n/a Version: 1.24 Critical Level: medium Type: SQL Injection Status: Unpatched. No reply from developer(s) PoC: Available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- http://evuln.com/vulns/174/description.html SQL Injection in "wsnuser" Cookie It is possible to inject arbitrary SQL query using "wsnuser" cookie parameter in the "index.php" script. Parameter "wsnuser" is used in SQL query without proper sanitation. --------PoC/Exploit-------- PoC code is available at: http://evuln.com/vulns/174/exploit.html ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/penetration-test.html - website manual penetration testing _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/