The AGB 2.2 appears vulnerable to SQL Injection granting the attacker administrator access.
The attack is very simple and consists of inputting the string detailed below, leaving the username entry blank:
') OR ('a' = 'a
I develop a fix to this issue (other alternative is upgrade to a newest version of AGB), just add the next lines to the file 'admin.php' into the guestbook dir.
starting from line 9
--- lines to add are below this line ---
$verifica = stristr($password," OR ");
if ($verifica <> FALSE) die ("A volar pancho!");
--- end
regards
Martin
The attack is very simple and consists of inputting the string detailed below, leaving the username entry blank:
') OR ('a' = 'a
I develop a fix to this issue (other alternative is upgrade to a newest version of AGB), just add the next lines to the file 'admin.php' into the guestbook dir.
starting from line 9
--- lines to add are below this line ---
$verifica = stristr($password," OR ");
if ($verifica <> FALSE) die ("A volar pancho!");
--- end
regards
Martin