Unofficial patch for the ASPjar Guestbook login.asp vulnerability that allows bypassing of the authentication process.
fc0f8893e127ff46a67d2fd0fcc9c8c314f1c77b8d8fdec1aefa4a8e8584889c
..::x0n3-h4ck.org Italian Security Team::..
ASPjar Guestbook login.asp not official patch
Application: Aspjar Guestbook
Version: 1.0
Bug: Sqj injection
Vendor : not attainable
DETAILS
Supply in the password field ' or ''=', this should allow you to bypass
the authentication process used by ASPjar Guestbook.
Patch:
This is patch created by Expanders from x0n3-h4ck Italian Security Team.
Find in the file admin\login.asp this is string:
strSql ="SELECT * from admin where Name = '" & Request.Form("User") & "' and
password = '" & Request.Form("Password") &"'"
you replace with:
strSql ="SELECT * from admin where Name = '" &
replace(Request.Form("User"),"'","") & "' and password = '" &
replace(Request.Form ("Password"),"'","") &"'"
For Info www.x0n3-h4ck.org
CorryL
corryl80@gmail.com
www.x0n3-h4ck.org
_________________________________
www.seekstat.it is your web stat