First published: Thu Jun 14 2007(Updated: )
PHP remote file inclusion vulnerability in admin/editor2/spaw_control.class.php in the Cjay Content 3 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this may be a duplicate of CVE-2006-4656.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xoops Cjay Content Module | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-3220 is considered high due to its potential to allow remote code execution.
To fix CVE-2007-3220, update to the latest version of the Cjay Content module for XOOPS that addresses this vulnerability.
CVE-2007-3220 affects version 3 of the Cjay Content module for XOOPS.
CVE-2007-3220 is classified as a PHP remote file inclusion vulnerability.
Yes, CVE-2007-3220 can significantly impact server security by allowing attackers to execute arbitrary PHP code.