GaesteChaos versions 0.2 and below suffer from SQL injection and cross site scripting vulnerabilities.
a36e34100940cdbee2af6338e2e296e710c1feff3e0bdbaf4d0848299e5d6a7c
Advisory: GaesteChaos <= 0.2 Multiple Vulnerabilities
Release Date: 2006/08/04
Last Modified: 2006/08/03
Author: Tamriel [tamriel at gmx dot net]
Application: GaesteChaos <= 0.2
Risk: Moderate
Vendor Status: not contacted
Vendor Site: www.chaossoft.de
Overview:
Quote from www.chaossoft.de:
"GaesteChaos ist ein Gaestebuch für Ihre Homepage. Es
ist klein und kompakt in PHP geschrieben und benutzt
mySQL, um die Daten abzuspeichern."
Details:
1) In the eintragen.php are some possible cross site scripting
vulnerabilities.
This can be used to insert malicious code that will be executed
on the client's machine.
The input fields "gastname" and "gastwohnort" will be not checked
by this script.
2) SQL Injection Vulnerabilities in eintragen.php
(arround line 35-45)
...
mysql_db_query($database, "INSERT INTO $tabellekommentar SET
eintragid = '$komwelches', name = '$gastname',email = '$gastemail',
wohnort = '$gastwohnort', datum ='$timestamp', ip = '$tempip',
host = '$hosti', homepage = '$gasthomepage', eintrag = '$gasteintrag',
geschlecht = '$geschlechti'");
...
Solution:
Take a view on PHP's htmlentities and mysql_real_escape_string functions.