J-Security Center

Title: Xeobook Multiple SQL Injection Vulnerabilities

Severity: MODERATE

Description:

Xeobook is a guestbook script written in PHP.

Xeobook is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in SQL queries. Specifically, it fails to properly sanitize input to the following parametes of the 'sign.php' script:

'$HTTP_USER_AGENT'
'$gb_entry_text'
'$gb_location'
'$gb_fullname'
'$gb_sex'

Exploiting these vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Xeobook 0.93 and prior versions are reported vulnerable.

Affected Products:

  • Xeobook Xeobook 0.93.0

References:

Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.