vendor:
Gästebuch
by:
Perforin
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Gästebuch
Affected Version From: 1.7b
Affected Version To: 1.7b
Patch Exists: NO
Related CWE: N/A
CPE: a:perlsoft:gästebuch
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008
PerlSoft Gästebuch Remote Command Execution Vulnerability
PerlSoft Gästebuch is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the application fails to adequately sanitize user-supplied input. Note that an attacker must have administrative access to the script to exploit this issue. Successful attacks can compromise the affected application and possibly the underlying computer.
Mitigation:
Administrators should ensure that user-supplied input is properly sanitized.