Vulnerabilities > CVE-2007-0609 - Local File Include vulnerability in Advanced Guestbook Advanced Guestbook 2.4.2
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Directory traversal vulnerability in Advanced Guestbook 2.4.2 allows remote attackers to bypass .htaccess settings, and execute arbitrary PHP local files or read arbitrary local templates, via a .. (dot dot) in a lang cookie, followed by a filename without its .php extension, as demonstrated via a request to index.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Advanced Guestbook 2.4.2 Lang Cookie Parameter Local File Include Vulnerability. CVE-2007-0609. Webapps exploit for php platform |
id | EDB-ID:30015 |
last seen | 2016-02-03 |
modified | 2007-05-08 |
published | 2007-05-08 |
reporter | netVigilance |
source | https://www.exploit-db.com/download/30015/ |
title | Advanced Guestbook 2.4.2 Lang Cookie Parameter Local File Include Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | ADVANCED_GUESTBOOK_LANG_DIR_TRAVERSAL.NASL |
description | The remote host is running Advanced Guestbook, a free guestbook written in PHP. The installed version of Advanced Guestbook fails to validate input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25170 |
published | 2007-05-09 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25170 |
title | Advanced Guestbook index.php lang Cookie Parameter Path Disclosure |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/56545/ag-traverse.txt |
id | PACKETSTORM:56545 |
last seen | 2016-12-05 |
published | 2007-05-08 |
reporter | Jesper Jurcenoks |
source | https://packetstormsecurity.com/files/56545/ag-traverse.txt.html |
title | ag-traverse.txt |
References
- http://secunia.com/advisories/25153
- http://securityreason.com/securityalert/2662
- http://www.netvigilance.com/advisory0012
- http://www.netvigilance.com/advisory0013
- http://www.securityfocus.com/archive/1/467937/100/0/threaded
- http://www.securityfocus.com/archive/1/467941/100/0/threaded
- http://www.securityfocus.com/bid/23876
- http://www.vupen.com/english/advisories/2007/1726
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34152