vendor:
GUESTEX
by:
K-sPecial
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: GUESTEX
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2006
GUESTEX-exec.pl
GUESTEX guestbook is vulnerable to remote code execution in how it handles its 'email' parameter. The script does not properly sanitize the 'email' parameter, which is used when opening a pipe to sendmail.
Mitigation:
Ensure proper sanitization of user input, especially when using it to execute commands or open system resources.