Retired: EtermalMart Guestbook Auth.PHP Remote File Include Vulnerability

EternalMart Guestbook is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate a remote compromise of the underlying system; other attacks are also possible.

This issue affects version 1.1.0; other versions may also be vulnerable.

This issue was previously discussed in BID 8767 (EternalMart Multiple Remote File Include Vulnerabilities).


 

Privacy Statement
Copyright 2010, SecurityFocus