"evaluatorSolution":"Vendor has supplied a patch for this vulnerability: http://cms.webspell.org/index.php?site=files&cat=10",
"descriptions":[
{
"lang":"en",
"value":"Absolute path traversal vulnerability in index.php in Webspell 4.01.02 allows remote attackers to include and execute arbitrary local files via a full pathname in the site parameter. NOTE: some of these details are obtained from third party information."
},
{
"lang":"es",
"value":"Vulnerabilidad de salto de ruta absoluta en el index.php del Webspell 4.01.02 permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n a trav\u00e9s de un pathname completo en el par\u00e1metro site. NOTA: algunos de estos detalles se obtienen a partir de la informaci\u00f3n de terceros."