___________    ____________    ____  __  ___    ______________
|\    ____  \  |\    ____   \  |\   \|\ \|\  \  |\_____    ____\
| \   \__|\  \ | \   \__|\   \ | \   \ \ \ \  \ | |   |\   \   |
\  \    ___   | \ \    ____   \ \ \   \_| \_|  \ \|___| \   \__|
  \  \   \_|\  \_ \ \   \__|\   \ \ \      _     \      \ \   \
   \  \   \\ \   \ \ \   \ \ \   \ \ \     |\ http://rawt.daemon.sh
    \  \___\\ \___\ \ \___\ \ \___\ \ \____| \_____\      \ \___\
     \ |   | \ |   | \ |   | \ |   | \ |   |\ |    |       \ |   |
      \|___|  \|___|  \|___|  \|___|  \|___| \|____|        \|___|


Levcgi.coms MyGuestbook JavaScript Injection Vulnerability
Discovered By BrainRawt ([EMAIL PROTECTED])

About MyGuestbook:
------------------
Highly customizable guestbook that was released on Feb. 20, 2002, and
can be downloaded at http://www.levcgi.com/programs.cgi?program=myguestbook

According to the website, ...myGuestbook has been downloaded 1298 times!

Vulnerable (tested) Versions:
--------------------
MyGuestbook v 1.0

Vendor Contact:
----------------
4-28-02 - Emailed [EMAIL PROTECTED]

4-30-02 - No Reply from the author and I have decided not to wait since I
           never got a reply about another concern i had several months ago
           involving one of his cgi scripts.

Vulnerability:
----------------
myguestbook inproperly filters input to the guestbook making the guestbook
prone to cross-site scripting attacks by malicious visitors to the site. 
This
could be a medium to high concern when mixed with a website that uses 
cookies.

Exploit (POC):
----------------
Sign up and post using the "name" 
<script>alert('evil+java+script+here')</script>

or

When posting comments just insert the 
<script>alert('evil+java+script+here')</script>
to the comments field.


--------------------------------------------------------------------------
Knowledge is Power! How Powerful are you? - BrainRawt



_________________________________________________________________
Send and receive Hotmail on your mobile device: http://mobile.msn.com

Reply via email to