CVE-2007-3057

critical

Description

PHP remote file inclusion vulnerability in include/wysiwyg/spaw_control.class.php in the icontent 4.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

References

https://www.exploit-db.com/exploits/4022

https://exchange.xforce.ibmcloud.com/vulnerabilities/34681

http://www.vupen.com/english/advisories/2007/2047

http://www.securityfocus.com/bid/24302

http://secunia.com/advisories/25522

http://osvdb.org/35381

http://attrition.org/pipermail/vim/2007-June/001639.html

Details

Source: Mitre, NVD

Published: 2007-06-06

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical