5
Quote:
Could "Spaw" be related to the wysiwyg editor of the same name?
That's my understanding. I believe it is a vulnerability in an old version of the Spaw editor which exists with those modules/scripts that make use of its class. My wiwimod doesn't, probably because it never did. But perhaps, I've also kicked out Spaw, because I had other wysiwyg editors.
In any case, I don't know what happens at those sites where the wiwimod version with the spaw editor has been simply upgraded, without removing the spaw files, so that, even though the spaw stuff isn't used by wiwimod anymore, it's still there and waiting to be attacked. One would hope it aborts, because of errors and root path and stuff, but who knows?
Which is why I would recommend everyone has a look into their installation and see whether they have the spaw stuff in there. In case they do, it might be wise to take precautions. I think that just deleting the directory root/modules/wiwimod/spaw should do here.
That's a remote file inclusion vulnerability, and it seems to be really ridiculously easy to exploit. You just pass a path to your own script in the url query string, and that stupid spaw script parses your own malicious script and includes it in its own flow. Something like that. It does you the favor to parse your own script, figure that!
Apparently, the vulnerable spaw has also been used in
XT Conteudo (see last comment), and who knows where else. I, in any case, have grep'd all my installation for all vestiges of spaw.