vendor:
NC GBook
by:
ThE g0bL!N
9,3
CVSS
HIGH
Remote Command Injection
78
CWE
Product Name: NC GBook
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:php-gaestebuch:nc_gbook:1.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
NC GBook 1.0 Remote Command injection Exploit
An attacker can exploit a vulnerability in NC GBook 1.0 to inject arbitrary commands into the application. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'Autor', 'E-Mail' and 'Homepage' fields when adding a new entry. An attacker can exploit this vulnerability to inject arbitrary commands into the application, which will be executed with the privileges of the web server process. This can be exploited to gain access to the server, or to execute arbitrary PHP code.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized.