@lex Guestbook version 3.3 is susceptible to cross site scripting and injection attacks.
eabb3773c1c434b14ac8952462b781b24c7e0413a25f8f43a3d610378e0c73c7
------------------------------------------------------
Nightmare TeAmZ Advisory 010
------------------------------------------------------
Date - 10/2005
@lex Guestbook 3.3 XSS & CRLF injection
AFFECTED PRODUCTS
=================
@lex Guestbook
https://www.alexphpteam.com
OVERVIEW
========
Nice Guestbook with Many functionalities: 5 databases accepted + ODBC
connection (MySQL, MsAccess, MsSQL, Oracle, PostgreSql 7), automatic
installation, smilies, management of the censurable words, IP addresses
banning, search engine, etc
DETAILS
=======
1. Xss
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into
a vulnerable application to fool a user in order to gather data from them.
2. CRLF
a remote attacker to inject custom HTTP headers.
POC
===
1.
------
XSS:
www.[host].com/[path]/index.php?mots_search=1&rechercher=Ok&debut=0&lang=1&skin=[XSS]
2.
------
CRLF:
www.[host].com/[path]/add_message.php?nom=1&email=1&site=1&ville_pays=1¬e_site=1&message_textarea=1&reste_car=%201000%20caract%E8re%28s%29%20encore%20disponible%28s%29&code_securite=1&num_id=[CRLF]
SOLUTION:
=========
--No Solution--
Credits
=======
This vulnerability was discovered and researched by
BiPi_HaCk of Nightmare TeAmZ
We're: BiPi_HacK - r3d_4Ss4ult3r - Sub_Z3r0
-----------------
Site: https://www.NightmareTeAmZ.altervista.org <---------------- Go!
----------------
_________________________________________________________________
Personalizza MSN Messenger con sfondi e fotografie!
https://www.ilovemessenger.msn.it/