CVE-2006-6764

PHP remote file inclusion vulnerability in authenticate.php in Keep It Simple Guest Book (KISGB), when executing PHP through CGI, allows remote attackers to execute arbitrary PHP code via a URL in the default_path_to_themes parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:keep_it_simple_guest_book:keep_it_simple_guest_book:*:*:*:*:*:*:*:*
cpe:2.3:a:keep_it_simple_guest_book:keep_it_simple_guest_book:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://secunia.com/advisories/23477 - Exploit, Vendor Advisory () http://secunia.com/advisories/23477 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/21721 - () http://www.securityfocus.com/bid/21721 -
References () http://www.vupen.com/english/advisories/2006/5147 - () http://www.vupen.com/english/advisories/2006/5147 -
References () https://www.exploit-db.com/exploits/2979 - () https://www.exploit-db.com/exploits/2979 -

Information

Published : 2006-12-27 02:28

Updated : 2025-04-09 00:30


NVD link : CVE-2006-6764

Mitre link : CVE-2006-6764

CVE.ORG link : CVE-2006-6764


JSON object : View

Products Affected

keep_it_simple_guest_book

  • keep_it_simple_guest_book