[29669] in bugtraq

home help back first fref pref prev next nref lref last post

SignHere guestbook vulnerability.

daemon@ATHENA.MIT.EDU (drG4njubas)
Sat Apr 5 11:56:12 2003

From: "drG4njubas" <drG4nj@mail.ru>
To: <bugtraq@securityfocus.com>
Date: Sat, 5 Apr 2003 13:07:05 +0400
Message-ID: <000001c2fb52$bbbe34d0$d987763e@user1>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="koi8-r"
Content-Transfer-Encoding: 7bit

This advisory nd other useful files 
can be found at www.blacktigerz.org

Subject:
SignHere guestbook vulnerability.

Description:
Free, easy-to-use guestbook. Main features are: message text 
formatting (bold text, urls etc.); inserting smiles as icons; 
web-based administration; email notifications about new posts. 
Also html output is optimized to maximize download speed. 

Vendor:
Bitstrike software.
http://www.bitstrike.com

Vulnerability:
Default.asp neglects filtering user input allowing 
for script injection to the guestbook via "Email" 
field. The injected script will be executed in 
anyones browser who visits the guestbook.

____________________________
Best Regards,   drG4njubas
Black Tigerz Research Group
http://www.blacktigerz.org


home help back first fref pref prev next nref lref last post