The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


OpenGuestbook Cross Site Scripting & SQL Injection


<< Previous INDEX Search src / Print Next >>
Date: 25 Jun 2006 07:07:33 -0000
From: [email protected]
To: [email protected]
Subject: OpenGuestbook Cross Site Scripting & SQL Injection
X-Virus-Scanned: antivirus-gw at tyumen.ru

Produce     : Open Guestbook 0.5
Site        : http://sourceforge.net/projects/openguestbook
Discovred by: Moroccan Security Team (Simo64)
Greetz to   : And All Friends :)

Details :
=========

[+]Cross Site Scripting
************************

  [-]vulnerable code in header.php on line 5

  [1]  <html>
  [2]
  [3]  <head>
  [4]
  [5]  <title><? echo "$title"; ?></title>
  
   --------------------
   
   Exploit : http://localhost/openguestbook/header.php?title=<;/title>[XSS]
   
  [-] Solution
  
  edit line 5 on header.php
  
  [5] <title><? echo htmlspecialchars($title); ?></title>
   
   
[+]SQL Injection 
******************

   [-]vulnerable code near lines 23 - 28
   
   [23]  if (empty($offset)) {
   [24]  $offset=0;
   [25]  }
   [26]  
   [27]  // get results
   [28]  $result=mysql_query("SELECT * FROM $tentries ORDER BY ID DESC limit $offset,$limit");

   [-]Exploit : http://localhost/openguestbook/view.php?offset=&#091;SQL]

   [-]Solution :
   
   edit line 23 in view.php 
   
   [23]  if (empty($offset) OR !is_numeric($offset) {
   [24]  $offset=0;

   
[+] Contact :
**************

simo64[at]gmail[dot]com


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру