Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pwm9-qhfp-646f

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

FreeScripts VisitorBook LE (visitorbook.pl) does not properly escape line breaks in input, which allows remote attackers to (1) use VisitorBook as an open mail relay, when $mailuser is 1, via extra headers in the email field, or (2) cause the guestbook database to be deleted via a large number of line breaks that exceeds the $max_posts variable.

FreeScripts VisitorBook LE (visitorbook.pl) does not properly escape line breaks in input, which allows remote attackers to (1) use VisitorBook as an open mail relay, when $mailuser is 1, via extra headers in the email field, or (2) cause the guestbook database to be deleted via a large number of line breaks that exceeds the $max_posts variable.

EPSS

Процентиль: 65%
0.00482
Низкий

Связанные уязвимости

nvd
около 22 лет назад

FreeScripts VisitorBook LE (visitorbook.pl) does not properly escape line breaks in input, which allows remote attackers to (1) use VisitorBook as an open mail relay, when $mailuser is 1, via extra headers in the email field, or (2) cause the guestbook database to be deleted via a large number of line breaks that exceeds the $max_posts variable.

EPSS

Процентиль: 65%
0.00482
Низкий