vendor:
Gastebuch
by:
7.5
CVSS
HIGH
Remote File Include
CWE
Product Name: Gastebuch
Affected Version From: Gastebuch 1.5
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
Mapos-Scripts.de Gastebuch Remote File Include Vulnerability
The Mapos-Scripts.de Gastebuch application is prone to a remote file-include vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by including a remote file containing malicious PHP code and executing it in the context of the webserver process. This could lead to compromise of the application and the underlying system.
Mitigation:
To mitigate this vulnerability, it is recommended to properly sanitize user-supplied input and validate input before including files.