Wernhart Guestbook suffers from a remote SQL injection vulnerability.
da7a3df7234479cba2cbdf182574070ecd8af6dca5fcaaf3f7d4f05a979de3fe
New eVuln Advisory:
Multiple SQL injections in Wernhart Guestbook
Summary: http://evuln.com/vulns/149/summary.html
Details: http://evuln.com/vulns/149/description.html
-----------Summary-----------
eVuln ID: EV0149
Software: Wernhart Guestbook
Vendor: Carl A. Wernhart
Version: 2001.03.28
Critical Level: low
Type: SQL Injection
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
Multiple SQL injections:
All user-defined parameters are not sanitized.
Arbitrary SQL injections are possible.
Vulnerable scripts: insert.phtml, select.phtml.
Conditions:
magic_quotes_gpc = Off
register_globals: On
--------PoC/Exploit--------
Multiple SQL inj example
Here is 'union select' example:
http://website/guestbook/insert.phtml?LastName=' union select 1,2,3,4,5,6/*
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/xss/url.html - recent url xss vulns