First published: Thu Jun 14 2007(Updated: )
PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the XT-Conteudo module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xoops Xt-conteudo Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3221 is classified as a high-severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-3221, update the XT-Conteudo module for XOOPS to the latest version that addresses this vulnerability.
CVE-2007-3221 affects the XT-Conteudo module specifically used in XOOPS installations.
CVE-2007-3221 is a remote file inclusion vulnerability that allows unauthorized execution of PHP code.
Yes, CVE-2007-3221 is likely a duplicate of CVE-2006-4656, indicating similar vulnerability characteristics.