vendor:
XOOPS Module icontent
by:
Mahmood_ali
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: XOOPS Module icontent
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
XOOPS Module icontent v.1.0 Remote File Inclusion Exploit
This exploit allows an attacker to include a remote file in the XOOPS Module icontent v.1.0. The vulnerability exists in the 'spaw_control.class.php' file located in the '/modules/icontent/include/wysiwyg/' directory. By manipulating the 'spaw_root' parameter in the URL, an attacker can include a malicious file from a remote server, potentially leading to remote code execution.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a patched version of the XOOPS Module icontent.