source: https://www.securityfocus.com/bid/14862/info Content2Web is affected by multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this lack of sanitization to perform SQL injection attacks, cross-site scripting attacks and include local PHP files. It may also be possible to include remote PHP files as well; this has not been confirmed. The consequences of these attacks vary from a compromise of the system, the execution of arbitrary code and the theft of cookie-based authentication credentials, all in the context of the Web server process. SQL Injection ------------- http://www.example.com/index.php?show=c2w_news%2Ephp&cat=news_archiv XSS --- http://www.example.com/index.php?show=%3C/textarea%3E%3Cscript%3Ealert(%27XSS aka %27);%3C/script%3E&site=impressum File Inclusion -------------- http://www.example.com/index.php?show=[file]&cat=news_archiv&start=1