Ref: SS#17082005 SYSTEMSECURE.ORG - Advisory/Exploit * PUBLIC ADVISORY * Software: Emefa Guestbook v1.2 Link: http://www.emefa.myserver.org/comp/guestview.php Attacks: HTML Injection Vulnerability Discovered by: David Sopas Ferreira [SmOk3] ยป smok3f00 at gmail.com -- ! Description !-- Emefa Guestbook is reportedly vulnerable to an HTML injection vulnerability. This is due to the application failing to properly sanitize user-supplied input. The problem is in file "sign.asp" on fields (name, email, location and message). An attacker could also exploit this issue to control how the site is rendered to the user, other attacks are also possible. PoC: All fields on "sign.asp":

can be exploited

-- ! Solution !-- Filter out the variables from malicious code. -- ! Vendor !-- Contacted and didn't replyed. Rm9y52EgUG9ydHVnYWw= -EOF-