Oscailt 3.3 CMS Local File Inclusion Vulnerability
Oscailt 3.3 CMS is vulnerable to Local File Inclusion vulnerability due to improper sanitization of user input in the index.php file. An attacker can exploit this vulnerability by sending a crafted HTTP request with maliciously crafted obj_id parameter. This can allow an attacker to include arbitrary files from the web server, which can lead to remote code execution. The vulnerable code is located in the index.php file, where the $cachefile variable is used to include a file from the cache directory. The getObjectCacheIndexFile() function is used to construct the path of the file to be included. This function takes the $id parameter and concatenates it with the '.inc' extension, which can be manipulated by an attacker to include arbitrary files from the web server.