First published: Sun Jul 21 2024(Updated: )
A vulnerability, which was classified as problematic, was found in formtools.org Form Tools 3.1.1. Affected is the function curl_exec of the file /admin/forms/option_lists/edit.php of the component Import Option List. The manipulation of the argument url leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271992. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MooTools | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6937 is classified as problematic, indicating significant security risks.
CVE-2024-6937 affects Form Tools 3.1.1 through a vulnerability in the curl_exec function that allows for file inclusion.
To fix CVE-2024-6937, update Form Tools to a patched version released after 3.1.1.
CVE-2024-6937 enables attackers to exploit file inclusion vulnerabilities.
Temporary workarounds for CVE-2024-6937 include disabling the affected functionality until a permanent fix is applied.