exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

advisory-realGuestbook_V5-en.txt

advisory-realGuestbook_V5-en.txt
Posted Mar 28, 2007
Authored by Ruben Ventura Pina | Site trew.icenetx.net

realGuestbook_V5 suffers from a HTML injection vulnerability.

tags | exploit
SHA-256 | b86ba6f04ebc3607caae18cbb9583cca99aa5c34260a4f01415eda8a014f5b3c

advisory-realGuestbook_V5-en.txt

Change Mirror Download
--------------------------------------------------------
realGuestbook_V5 Script Injection Vulnerability |
Discovered by Trew | ICEnetX Team http://icenetx.net |
http://trew.icenetx.net trew.revolution@gmail.com |
--------------------------------------------------------

Date: 17 march 2007
Vendor URL: http://realscripts.de
Risk: Medium
Satatus: Unpatched

## Vulnerability ##

realGuestbook_V5 is a German Guestbook system. This guestbooks may allow an attacker to inject code into the page. The injection is achieved through injecting code into the homepage field, some administrators decide to delete this field, but the original version of the aplication includes this field.

The vulnerability is located in the page where comments are sent (default: add_entry.php). This is the
vulnerable field:

<input type="text" name="hoempage" style="width:100%" value=" INYECTION GOES HERE ">

The 'homepage' variable is not santized correctly, so code can be injected by breaking the link tag generated in
guestbook.php, by writting the characters "> at the beggining of the URL field.

Attack example:

URL value: url = http://trew.icenetx.net
Result in guestbook.php: <a href="http://trew.icenetx.net">...

URL value: url = "><h1>HACKED</h1>
Resultin guestbook.php: <a href=""><h1>HACKED</h1> ...

## How to fix ##

Filter or delete the URL field at add_entry.php

-----
"Maybe you can't break the system, but you can always hack it."
http://trew.icenetx.net trew.revolution@gmail.com
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close