[29669] in bugtraq
SignHere guestbook vulnerability.
daemon@ATHENA.MIT.EDU (drG4njubas)
Sat Apr 5 11:56:12 2003
From: "drG4njubas" <drG4nj@mail.ru>
To: <bugtraq@securityfocus.com>
Date: Sat, 5 Apr 2003 13:07:05 +0400
Message-ID: <000001c2fb52$bbbe34d0$d987763e@user1>
MIME-Version: 1.0
Content-Type: text/plain;
charset="koi8-r"
Content-Transfer-Encoding: 7bit
This advisory nd other useful files
can be found at www.blacktigerz.org
Subject:
SignHere guestbook vulnerability.
Description:
Free, easy-to-use guestbook. Main features are: message text
formatting (bold text, urls etc.); inserting smiles as icons;
web-based administration; email notifications about new posts.
Also html output is optimized to maximize download speed.
Vendor:
Bitstrike software.
http://www.bitstrike.com
Vulnerability:
Default.asp neglects filtering user input allowing
for script injection to the guestbook via "Email"
field. The injected script will be executed in
anyones browser who visits the guestbook.
____________________________
Best Regards, drG4njubas
Black Tigerz Research Group
http://www.blacktigerz.org