[34299] in bugtraq

home help back first fref pref prev next nref lref last post

vuln

daemon@ATHENA.MIT.EDU (=?koi8-r?Q?=22?=ShelzZ=?koi8-r?Q?=)
Mon Mar 29 14:29:26 2004

From: =?koi8-r?Q?=22?=ShelzZ=?koi8-r?Q?=22=20?= <shelzz@mail.ru>
To: bugtraq@securityfocus.com
Mime-Version: 1.0
Date: Mon, 29 Mar 2004 01:11:55 +0400
Reply-To: =?koi8-r?Q?=22?=ShelzZ=?koi8-r?Q?=22=20?= <shelzz@mail.ru>
Content-Type: text/plain; charset=koi8-r
Content-Transfer-Encoding: 8bit
Message-Id: <E1B7hZT-000OxT-00.shelzz-mail-ru@f17.mail.ru>

#############################
#0x29a team security advisory
#############################
#Product: Fresh Guest book
#Script: guest.cgi
#Company: WebFresh
#Vulnerability: XSS
#############################
#Overview:
HiGuest is a simple perl-guestbook, which include all standart
guestbook functions.
#Bug: Any remote user can execute html code on the vulnerable system.
The script don't filter incoming data in "Name" area.
#w0w
http://0x29a.hncrew.org

home help back first fref pref prev next nref lref last post