Vulnerability Description
PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the TinyContent 1.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this issue is probably a duplicate of CVE-2006-4656.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xoops | Tinycontent Module | 1.5 |
References
- http://osvdb.org/35383
- http://secunia.com/advisories/25652
- http://www.vupen.com/english/advisories/2007/2204
- http://www.xoops.org/modules/news/article.php?storyid=3799
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34839
- https://www.exploit-db.com/exploits/4063
- http://osvdb.org/35383
- http://secunia.com/advisories/25652
- http://www.vupen.com/english/advisories/2007/2204
- http://www.xoops.org/modules/news/article.php?storyid=3799
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34839
- https://www.exploit-db.com/exploits/4063
FAQ
What is CVE-2007-3237?
CVE-2007-3237 is a vulnerability with a CVSS score of 6.8 (MEDIUM). PHP remote file inclusion vulnerability in admin/spaw/spaw_control.class.php in the TinyContent 1.5 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root pa...
How severe is CVE-2007-3237?
CVE-2007-3237 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3237?
Check the references section above for vendor advisories and patch information. Affected products include: Xoops Tinycontent Module.