"evaluatorSolution":"The vendor has provided the following patch information:\r\n\r\nThe patch is located at\r\nhttp://xkiosk.net/xkiosk.3.0.1j.web.5314.fix.zip\r\n\r\nHow to apply the fix:\r\nExtract \"upload\" folder contents to your current xKiosk WEB installation, overwrite if required.",
"descriptions":[
{
"lang":"en",
"value":"PHP remote file inclusion vulnerability in system/funcs/xkurl.php in xKiosk WEB 3.0.1i, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the PEARPATH parameter."
},
{
"lang":"es",
"value":"Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en system/funcs/xkurl.php de xKiosk WEB 3,0.1i, cuando register_globals est\u00e1 activado, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un URL en el par\u00e1metro PEARPATH."