vendor:
xGB
by:
SecurityFocus
8.8
CVSS
HIGH
PHP Code Injection
94
CWE
Product Name: xGB
Affected Version From: xGB
Affected Version To: xGB
Patch Exists: No
Related CWE: N/A
CPE: a:xgb:xgb
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Linux, Microsoft Windows
2002
xGB PHP Code Injection
xGB is guestbook software written in PHP and running on most Unix and Linux variants as well as Microsoft Windows operating systems. It does not sufficiently validate input that is supplied via form fields, allowing an attacker to inject arbitrary PHP code into form fields. By inserting the code "<?php echo"delete datafile";?>" into a field such as "Ihr Name", "Ihre eMail", "Homepage-Name" or "Homepage-URL" and then submitting the form twice, the datafile can be deleted and only the last message is saved in it.
Mitigation:
Validate user input to ensure that it does not contain malicious code.