ScozBook BETA 1.1 vulnerabilities

From: euronymous (just-a-userat_private)
Date: Fri Mar 28 2003 - 19:42:47 PST

  • Next message: Claus Assmann: "sendmail 8.12.9 available"

    =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
    topic: ScozBook BETA 1.1 vulnerabilities 
    product: ScozBook BETA 1.1 
    vendor: http://www.scoznet.com
    risk: high
    date: 03/29/2k3
    discovered by: euronymous /F0KP 
    advisory urls: http://f0kp.iplus.ru/bz/018.en.txt
                   http://f0kp.iplus.ru/bz/018.ru.txt 
    =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
    
    description
    -----------
    
    1) script injection
    
    add.php script doesnt check the variables $username, 
    $useremail, $aim, $msn, $sitename and $siteaddy. 
    so, u can insert there any evil html, javascript 
    code in these fields.
    
    http://hostname/scozbook/add.php
    
    
    2) path disclosure
    
    u can call the view.php script with PG parameter, 
    value of that is not exists, then u will see 
    full system path of guestbook:
    
    http://hostname/scozbook/view.php?PG=any_bullshit
    
    ===============================================================
    Warning: Supplied argument is not a valid MySQL result resource 
    in c:\apache\htdocs\scozbook\view.php on line 75
    ===============================================================
    
    
    shouts: R00tC0de, DWC, DHG, HUNGOSH, security.nnov.ru,
    all russian security guyz!! to kate especially )) 
    f*ck_off: slavomira and other dirty ppl in *.kz $#%&^!
    
    ================
    im not a lame,
    not yet a hacker
    ================
    



    This archive was generated by hypermail 2b30 : Sat Mar 29 2003 - 09:20:01 PST