Bugtraq mailing list archives
Beanwebb Guestbook v1.0 vulnerabilities
From: "euronymous" <just-a-user () yandex ru>
Date: Sat, 29 Mar 2003 06:41:35 +0300 (MSK)
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::= topic: Beanwebb Guestbook v1.0 vulnerabilities product: Beanwebb Guestbook v1.0 vendor: http://www.adam.orientfans.co.uk risk: high date: 03/29/2k3 discovered by: euronymous /F0KP advisory urls: http://f0kp.iplus.ru/bz/016.en.txt http://f0kp.iplus.ru/bz/016.ru.txt =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::= description ----------- 1) script injection add.php script doesnt check the variables $name, $email, $comment. so, u can insert there any evil html, javascript code in fields `First name', `Your E-Mail' and `Your message'. http://hostname/guestbook/add.php 2) admin page free access admin page have not ask any login/password, so u can just go to: http://hostname/guestbook/admin.php and u will have full admin rights. shouts: R00tC0de, DWC, DHG, HUNGOSH, security.nnov.ru, all russian security guyz!! to kate especially )) f*ck_off: slavomira and other dirty ppl in *.kz $#%&^! ================ im not a lame, not yet a hacker ================
Current thread:
- Beanwebb Guestbook v1.0 vulnerabilities euronymous (Mar 29)