VS-Gastebuch Gb_Pfad Remote File Include Vulnerability
BID:22605
Info
VS-Gastebuch Gb_Pfad Remote File Include Vulnerability
| Bugtraq ID: | 22605 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1011 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 18 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | ajann is credited with the discovery of this vulnerability. |
| Vulnerable: |
VS-Gastebuch VS-Gastebuch 1.5.3 |
| Not Vulnerable: | |
Discussion
VS-Gastebuch Gb_Pfad Remote File Include Vulnerability
VS-Gastebuch is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process.
This issue affects version 1.5.3; previous versions may also be affected.
VS-Gastebuch is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process.
This issue affects version 1.5.3; previous versions may also be affected.
Exploit / POC
VS-Gastebuch Gb_Pfad Remote File Include Vulnerability
An attacker can exploit this issue via a web client.
An attacker can exploit this issue via a web client.
Solution / Fix
References
VS-Gastebuch Gb_Pfad Remote File Include Vulnerability
References:
References:
- VS-Gastebuch Web Page (Virtual Systems)