Justice Guestbook 1.3 vulnerabilities

2007.11.08
Credit: euronymous
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::= topic: Justice Guestbook 1.3 vulnerabilities product: Justice Guestbook 1.3 vendor: http://www.justice-media.de risk: high date: 03/29/2k3 discovered by: euronymous /F0KP advisory urls: http://f0kp.iplus.ru/bz/017.en.txt http://f0kp.iplus.ru/bz/017.ru.txt =:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::= description ----------- 1) script injection jgb.php3 script doesnt check the variables $name $homepage, $aim, $yim, $location and $comment. so, u can insert there any evil html, javascript code in these fields. http://hostname/jgb_eng_php3/jgb.php3 2) path disclosure if u call the cfooter.php3 script, that u get an error message, that contains full system path of guestbook: http://hostname/jgb_eng_php3/cfooter.php3 ================================================================= Fatal error: Call to undefined function: getsets() in /homepages/12/d13457710/htdocs/underground/guestbook/cfooter.php3 on line 31 ================================================================= shouts: R00tC0de, DWC, DHG, HUNGOSH, security.nnov.ru, all russian security guyz!! to kate especially )) f*ck_off: slavomira and other dirty ppl in *.kz $#%&^! ================ im not a lame, not yet a hacker ================


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top