Archive for July, 2009


Advanced Shoutbox and MySql Shoutbox scripts

July 11, 2009

Today I have found an XSS hole in the “Advanced Shoutbox” script and the same XSS hole and an SQL injection vulnerability in the “MySql shoutbox” wich are available here:

Advanced Shoutbox

index.php Line 37:
<form action="<?php echo $_SERVER["PHP_SELF"]; ?>" method="post">

index.php Line 79-82:
if($display == "all"){
?><a href="<?php echo $_SERVER["PHP_SELF"]; ?>">View small shoutbox</a><?php
?><a href="<?php echo $_SERVER["PHP_SELF"]; ?>?show=all">View all shouts</a><?php

Very easy to exploit:

Affected Version: 1.0

MySql shoutbox

The XSS hole is the same as above, but on the lines 50, 55 and 97-99.

SQL Injection:
The index.php does not sanitize the users input on lines 105 and 106.

$input_name = $_POST["input_name"];
$input_text = $_POST["input_text"];
if($row["name"] != $input_name && $row["comment"] != $input_text){
mysql_query("INSERT INTO $db_table (name,comment) VALUES ('$input_name','$input_text');") or die(mysql_error()); //insert name and shout

Just send a POST request to the index.php. In the name field enter whatever you want and in the text field enter ‘+@@version+’ (including the ‘).

Affected Version: 1.0

Vendor has been informed on 27.06.2009

This post has been automatically published after two weeks since the vendor has been informed.


Save The Net

July 9, 2009

“The Federal Government is planning to force all Australian servers to filter internet traffic and block any material the Government deems ‘inappropriate’. Under the plan, the Government can add any ‘unwanted’ site to a secret blacklist.

Testing has already begun on systems that will slow our internet by up to 87%, make it more expensive, miss the vast majority of inappropriate content and accidentally block up to 1 in 12 legitimate sites. Our children deserve better protection – and that won’t be achieved by wasting millions on this deeply flawed system.”

Sign the petition here


SQLi: Netbeans Sample Project “AirAlliance”

July 8, 2009

Today i got a notice that NetBeans 6.8 will have support for the Symfony PHP Framework. Because I really like to work with that Framework and I never worked with Netbeans (I use Eclipse instead) I thought I should give it a try. First I downloaded, installed and opened the development version. After that i openened the “AirAlliance” sample project (it’s not a symfony project).

But what I saw was not what I’d expected:

web/confirmreservation.php Line 33-48:
$itineraryData = getItinerary($IID);

web/itinerarymanager.php Line 329-341:
function getItinerary($IID){
 $connection = initDB();
 if($IID == 0){
  $query = "SELECT * FROM Itinerary";
  $query = "SELECT * FROM Itinerary WHERE IID='".$IID."'";
 $result = mysql_query($query);

Ok, it’s just a sample project.
But how to learn the good things from the bad ones if you don’t know that they are bad?

I’m not sure if this says something about the IDE itself but I think I will continue my work with Eclipse…


Stalking Husbands…

July 1, 2009

Last night I received an email through the full disclosure mailinglist. It seems that it was written by a stalking ex husband (Mitch Nash;

would like passwords for e mail, facebook, and my space for, and my space passwords for marlee_michelle. (x wife and daughter) thank you, mitch nash

20 minutes after I received this message, i wrote the following email to Michelle:

Hi Michelle,

it seems that someone (your ex husband?) tries to get some hackers to break into your (and your daughters) internet accounts.

Have a look here:

Maybee its better to change this passwords to totally random ones.

I just wanted to let you know…
If you have any questions, just send me an email…

Have a nice day,

I hope she did read it. I did not get an reply so far…