CVE-2008-1635

Keep It Simple Guest Book <5.1.1 - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in view_private.php in Keep It Simple Guest Book (KISGB) 5.0.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the tmp_theme parameter. NOTE: 5.1.1 is also reportedly affected.

Exploits (2)

exploitdb WRITEUP VERIFIED
by Cr@zy_King · textwebappsphp
https://www.exploit-db.com/exploits/5324
exploitdb WORKING POC VERIFIED
by mdx · textwebappsphp
https://www.exploit-db.com/exploits/2979

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41525
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28513
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5324

Scores

EPSS 0.0520
EPSS Percentile 90.0%

Details

CWE
CWE-22
Status published
Products (1)
raven_php_scripts/keep_it_simple_guest_book < 5.1.1
Published Apr 02, 2008
Tracked Since Feb 18, 2026