source: https://www.securityfocus.com/bid/30564/info
The Contact module for Chupix CMS is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit these issues using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
Contact 0.1.0 is vulnerable; other versions may also be affected.
http://www.example.com/path/index.php?module=[LFI]
http://www.example.com/path/admin/index.php?module=[LFI]