GuppY "selskin" Parameter Local and Remote File Inclusion Vulnerability
Description
A vulnerability has been identified in GuppY, which could be exploited by remote attackers to gain knowledge of sensitive information or execute arbitrary code. This issue is caused by input validation errors in the "inc/includes.inc" and "inc/boxleft.inc" scripts when processing the "selskin" parameter, which could be exploited by remote attackers to include remote PHP scripts or disclose the contents of local files with the privileges of the web server.
Vulnerable Products
Vulnerable Software: GuppY version 4.6.3 and prior