First published: Wed Jun 20 2007(Updated: )
PHP remote file inclusion vulnerability in spaw/spaw_control.class.php in the WiwiMod 0.4 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xoops Wiwimod Module | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3289 is considered a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2007-3289, update to a version of the WiwiMod module for XOOPS that addresses this vulnerability.
CVE-2007-3289 is a remote file inclusion vulnerability that allows attackers to execute arbitrary PHP code.
CVE-2007-3289 specifically affects the WiwiMod version 0.4 module for XOOPS.
Yes, CVE-2007-3289 can be exploited easily if the spaw_root parameter is not properly validated.