AOH :: HP Unsorted O :: C07-1129.HTM

Online BookMarks Multiple SQL Injection/XSS Vulnerabilities
Online BookMarks Multiple SQL Injection/XSS Vulnerabilities
Online BookMarks Multiple SQL Injection/XSS Vulnerabilities


Vigilon Advisory 


Application:   OnLine Bookmarks
Web Site: 
Versions:      0.6.12
Platform:      linux, windows, freebsd, sun
Bug:           Cross Site Scripting and SQL injection.
Fix Available: No
Severity: High

1) Introduction
2) Bug
3) The Code
4) Fix
5) About Vigilon

==============1) Introduction
online-bookmarks is a Bookmark management system to store your Bookmarks, Favorites and Links right in the WWW where they actually belong. It is meant for people who work often with different computers and browsers.

=====2) Bug
1. SQL Injection
2. Multiple Cross site Scripting

===================3) Proof of concept.
login with username '
login with password '

=====4) Fix
The author notified about the security issues two months ago.
some of the problems were fixed at version 0.6.12 however
sql injection and some cross site cripting are still exists.
no patched version been released.

=================5) About Vigilon
Vigilon Inc. is a security software company that helps organizations, 
and the security providers that serve them, 
reduce business risk while lowering operational security costs.
using the Continual Vigilance platform.

============6) Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

============7) FeedBack
Please send suggestions, updates, and comments to: 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH
We do not send spam. If you have received spam bearing an email address, please forward it with full headers to