Static code injection vulnerability in Sanus|artificium (aka Sanusart) Free simple guestbook PHP script, when downloaded before 20081111, allows remote attackers to inject arbitrary PHP code into messages.txt via the message parameter to act.php, which is executed when guestbook/guestbook.php is accessed. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/49703 - | |
References | () http://secunia.com/advisories/32643 - Vendor Advisory | |
References | () http://www.sanusart.com/news.php - | |
References | () http://www.securityfocus.com/bid/32240 - Exploit | |
References | () http://www.vupen.com/english/advisories/2008/3095 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46526 - | |
References | () https://www.exploit-db.com/exploits/7079 - |
Information
Published : 2009-08-11 21:00
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6934
Mitre link : CVE-2008-6934
CVE.ORG link : CVE-2008-6934
JSON object : View
Products Affected
sansuart
- free_simple_guestbook_php_script
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')