[VIM] True: XOOPS Module icontent v.1.0 Remote File Inclusion Exploit (Milw0rm 4022)
George A. Theall
theall at tenablesecurity.com
Sat Jun 2 01:47:44 UTC 2007
The affected file starts basically with:
include $spaw_root.'config/spaw_control.config.php';
so exploitation requires register_globals to be enabled.
In case anyone's curious, the issue is similar to the issue reported
last year by Kapda:
http://www.kapda.ir/advisory-331.html
That is, both phpwcms and Xoops' icontent module make use of a
vulnerable instance of SPAW PHP WYSIWYG editor control.
George
--
theall at tenablesecurity.com
More information about the VIM
mailing list