Description
Static code injection vulnerability in guestbook.php in 1Book 1.0.1 and earlier allows remote attackers to upload arbitrary PHP code via the message parameter in an HTML webform, which is written to data.php.
Exploits (1)
References (5)
Core 5
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5736
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30146
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42854
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1735/references
Various Sources x_refsource_confirm
http://1scripts.net/php-scripts/index.php?p=16
Scores
EPSS
0.0548
EPSS Percentile
90.2%
Details
CWE
CWE-94
Status
published
Products (1)
1-script/1-book
< 1.0.1
Published
Jun 10, 2008
Tracked Since
Feb 18, 2026