WANewsletter.Waroot.Parameter.File.Inclusion
Description
WAnewsletter has a remote file include vulnerability. A remote attacker could execute an arbitrary script on a vulnerable web server with the privileges of the server. The vulnerability can be exploited via a specially crafted URL request to the 'newsletter.php' script, using the 'waroot' parameter to specify a malicious PHP file from a remote system.
Affected Products
WAnewsletter version 2.1.3 and prior.
Impact
System compromise.
Recommended Actions
Currently we are not aware of any official supplied fix for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |