CVE-2008-6934

N/A Unknown
Published: August 11, 2009 Modified: April 23, 2026
View on NVD

Description

Static code injection vulnerability in Sanus|artificium (aka Sanusart) Free simple guestbook PHP script, when downloaded before 20081111, allows remote attackers to inject arbitrary PHP code into messages.txt via the message parameter to act.php, which is executed when guestbook/guestbook.php is accessed. NOTE: some of these details are obtained from third party information.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/49703
Source: cve@mitre.org
http://secunia.com/advisories/32643
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/32240
Source: cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2008/3095
Source: cve@mitre.org
Vendor Advisory
http://osvdb.org/49703
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32643
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.sanusart.com/news.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32240
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2008/3095
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46526
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/7079
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.6%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sansuart