Multiple vulnerabilities have been identified in DBGuestbook, which could be exploited by attackers to execute arbitrary commands. These issues are due to input validation errors in the "includes/utils.php", "includes/guestbook.php" and "includes/views.php" scripts when processing the "dbs_base_path" parameter, which could be exploited by remote attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: DBGuestbook version 1.1 and prior