header-logo
Suggest Exploit
vendor:
xGB
by:
SecurityFocus
8.8
CVSS
HIGH
PHP Code Injection
94
CWE
Product Name: xGB
Affected Version From: xGB
Affected Version To: xGB
Patch Exists: No
Related CWE: N/A
CPE: a:xgb:xgb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Linux, Microsoft Windows
2002

xGB PHP Code Injection

xGB is guestbook software written in PHP and running on most Unix and Linux variants as well as Microsoft Windows operating systems. It does not sufficiently validate input that is supplied via form fields, allowing an attacker to inject arbitrary PHP code into form fields. By inserting the code "<?php echo"delete datafile";?>" into a field such as "Ihr Name", "Ihre eMail", "Homepage-Name" or "Homepage-URL" and then submitting the form twice, the datafile can be deleted and only the last message is saved in it.

Mitigation:

Validate user input to ensure that it does not contain malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4515/info

xGB is guestbook software. It is written in PHP and will run on most Unix and Linux variants as well as Microsoft Windows operating systems.

xGB does not sufficiently validate input that is supplied via form fields. An attacker may, under some circumstances, exploit this condition to execute arbitrary commands via injection of PHP code into form fields.

First insert this code (<?php echo"delete datafile";?>) into a field like
"Ihr Name", "Ihre eMail", "Homepage-Name" or "Homepage-URL". After that you can see your text you have inserted into the "Text"-Field. Now insert the same code
into the same field as before. Now you get a error-message. If you now
insert a third message the whole datafile is deleted and only the last message is saved in it.