Beanwebb Guestbook v1.0 vulnerabilities

From: euronymous (just-a-userat_private)
Date: Fri Mar 28 2003 - 19:41:35 PST

  • Next message: euronymous: "Justice Guestbook 1.3 vulnerabilities"

    =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
    topic: Beanwebb Guestbook v1.0 vulnerabilities 
    product: Beanwebb Guestbook v1.0 
    vendor: http://www.adam.orientfans.co.uk
    risk: high
    date: 03/29/2k3
    discovered by: euronymous /F0KP 
    advisory urls: http://f0kp.iplus.ru/bz/016.en.txt
                   http://f0kp.iplus.ru/bz/016.ru.txt 
    =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
    
    description
    -----------
    
    1) script injection
    
    add.php script doesnt check the variables $name, 
    $email, $comment. so, u can insert there any evil 
    html, javascript code in fields `First name', 
    `Your E-Mail' and `Your message'.
    
    http://hostname/guestbook/add.php
    
    
    2) admin page free access
    
    admin page have not ask any login/password, so 
    u can just go to:
    
    http://hostname/guestbook/admin.php 
    
    and u will have full admin rights.
    
    
    shouts: R00tC0de, DWC, DHG, HUNGOSH, security.nnov.ru,
    all russian security guyz!! to kate especially )) 
    f*ck_off: slavomira and other dirty ppl in *.kz $#%&^!
    
    ================
    im not a lame,
    not yet a hacker
    ================
    



    This archive was generated by hypermail 2b30 : Sat Mar 29 2003 - 09:09:35 PST