`ZH2003-12SA (security advisory): PHP-Gästebuch Ver. 1.60 Beta
Name: PHP-Gästebuch (http://www.php-gaestebuch.de)
Affected System(s): All versions (?)
Platform(s): Windows and Unix
Original Advisory: http://www.zone-h.org/en/advisories/read/id=2764/
Issue: Information disclosure enables attackers to take administrative control
Author: Trash-80 - firstname.lastname@example.org
Zone-h Security Team has discovered a serious security flaw in PHP-Gästebuch Ver. 1.60 Beta and possibly in prior versions.
PHP-Gästebuch is a guestbook system that except a few bugs has functions like flooding and webfilter protections ... ;)
1.guestbookdat contains admin's saved settings for PHP-Gästebuch. Is not protected and an attacker can retrieve serious information about the guestbook.
2.pwd contains the admin's password which is encrypted by MD5 algorithm.
ex2:md5 encrypted password: ee21d5f27a8401788147f6f6184ddb11
md5 unencrypted password: roland
An attacker using a md5 cracker like Cain & Abel (www.oxid.it), can crack the hash and use the decrypted password in order to login as PHP-Gästebuch's administrator.
Protect these two files: guestbookdat & pwd.
The vendor has been contacted.
Trash-80 - www.zone-h.org operator
Now with e-mail forwarding for only US$5.95/yr
Powered by Outblaze