CVE-2007-3221

critical

Description

PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.

References

https://www.exploit-db.com/exploits/4069

https://exchange.xforce.ibmcloud.com/vulnerabilities/34855

http://www.vupen.com/english/advisories/2007/2205

http://www.securityfocus.com/bid/24470

http://secunia.com/advisories/25667

http://osvdb.org/36306

Details

Source: Mitre, NVD

Published: 2007-06-14

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical