|
Family: CGI abuses --> Category: attack
WebCalendar < 1.0.2 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in WebCalendar < 1.0.2
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server has a PHP application that is affected by
multiple vulnerabilities.
Description :
The remote version of WebCalendar does not validate input to the 'id'
and 'format' parameters of the 'export_handler.php' script before
using it to overwrite files on the remote host, subject to the
rights of the web server user id.
In addition, the 'activity_log.php', 'admin_handler.php',
'edit_report_handler.php', 'edit_template.php' and
'export_handler.php' scripts are prone to SQL injection attacks and
the 'layers_toggle.php' script is prone to HTTP response splitting
attacks.
See also :
http://www.ush.it/2005/11/28/webcalendar-multiple-vulnerabilities/
http://www.securityfocus.com/archive/1/418286/30/0/threaded
https://sourceforge.net/tracker/index.php?func=detail&aid=1369439&group_id=3870&atid=303870
Solution :
Upgrade to WebCalendar 1.0.2 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|