ID CVE-2007-3221
Summary PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.
References
Vulnerable Configurations
  • cpe:2.3:a:xoops:xt-conteudo_module:*:*:*:*:*:*:*:*
    cpe:2.3:a:xoops:xt-conteudo_module:*:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 11-10-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 24470
exploit-db 4069
osvdb 36306
secunia 25667
vupen ADV-2007-2205
xf xoops-xtconteudo-spawcontrol-file-include(34855)
Last major update 11-10-2017 - 01:32
Published 14-06-2007 - 23:30
Last modified 11-10-2017 - 01:32
Back to Top