CVE-2006-4889

Telekorn SignKorn Guestbook <1.3 - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in Telekorn SignKorn Guestbook (SL) 1.3 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the dir_path parameter in (1) index.php, (2) includes/functions.gb.php, (3) includes/functions.admin.php, (4) includes/admin.inc.php, (5) help.php, (6) smile.php, (7) entry.php; (8) adminhelp0.php, (9) adminhelp1.php, (10) adminhelp2.php, and (11) adminhelp3.php in (a) help/en and (b) help/de directories; and the (12) preview.php, (13) log.php, (14) index.php, (15) config.php, and (16) admin.php in the (c) admin directory, a different set of vectors than CVE-2006-4788.

Exploits (21)

exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28527
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28522
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28526
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28536
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28523
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28524
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28525
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28531
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28530
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28529
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28528
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28535
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28534
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28533
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28532
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28537
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28538
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28539
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28540
exploitdb WORKING POC VERIFIED
by ThE_LeO · textwebappsphp
https://www.exploit-db.com/exploits/28541
exploitdb WORKING POC VERIFIED
by SHiKaA · textwebappsphp
https://www.exploit-db.com/exploits/2354

References (25)

Core 25
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32201
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32218
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32205
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32217
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32211
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28888
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32214
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32206
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446086/100/0/threaded
URL Repurposed x_refsource_confirm
http://www.telekorn.com/forum/showthread.php?t=1427
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32215
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32200
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32204
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32208
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32203
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32207
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32199
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32202
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32210
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32212
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/19977
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32213
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32209
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/1619
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/32216

Scores

EPSS 0.0609
EPSS Percentile 90.8%

Details

Status published
Products (3)
telekorn/signkorn_guestbook 1.1
telekorn/signkorn_guestbook 1.2
telekorn/signkorn_guestbook < 1.3
Published Sep 19, 2006
Tracked Since Feb 18, 2026