what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Xeobook-0.93.txt

Xeobook-0.93.txt
Posted Oct 17, 2006
Authored by Tamriel

Xeobook 0.93 and prior suffer from multiple SQL injection vulnerabilities in sign.php.

tags | advisory, php, vulnerability, sql injection
SHA-256 | 1dca184e50da03006b8445edf76ebee26a6ebb4537e93453df9472833f92988a

Xeobook-0.93.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Advisory: Xeobook <= 0.93 Multiple SQL Injection Vulnerabilities
Release Date: 10/12/2006
Last Modified: 10/12/2006
Author: Tamriel [tamriel at gmx dot net]
Application: Xeobook <= 0.93
Risk: Moderate
Vendor Status: not contacted
Vendor Site: www.xeoman.com | www.xeoman.de


Overview:

Quote from www.xeoman.de:

"Xeobook is a highly customizable, easy to setup, secure guestbook
script based on PHP4 and MySQL. If you like a clean and fully
customizable layout this might be worth a try."

There are some SQL injection vulnerabilities which can be
exploited by malicious people to conduct SQL injection attacks.

The vulnerability has been discovered in the latest version,
0.93. Other versions may also be affected.


Details:

Multiple SQL Injections in sign.php

Input passed to the most parameters aren't properly sanitised
before they are used in a SQL query.

The best examples which an attacker could be use are
`$HTTP_USER_AGENT` and `$gb_entry_text`.

All other variables are affected too but they are shorted by
the scripts `format_wordlength` function.

The other variables are `$gb_location`, `$gb_fullname` and
`$gb_sex`.


Proof of Concept:

Put `/*` into the `$gb_entry_text` variable


Notes:

rjonesx has already discovered a vulnerability in Xeobook,
which can be exploited to perform script insertion attacks.
Because there is no released patch or something similar yet,
I will not contact the vendor. To fix all these bugs you
could write the complete guestbook new.


Solution/Fix:

You must have register_globals enabled to run this script,
disable it and edit the source code to ensure that input is
properly sanitised and change all input variables.

Use functions like PHP's htmlentities() and
mysql_real_escape_string() functions.


Disclosure Timeline:

10/12/2006 - Discovery of the vulnerabilities
10/12/2006 - Public disclosure
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFFLbSlqBhP+Twks7oRCh7CAJwNUgT5OwDcgwj/1YTY58hw6sumrgCcC0/D
6/DRyVO8YVSvKsFKvtoK5gY=
=yNlp
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close