Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

WebCalendar file reading Vulnerability Scan


Vulnerability Scan Summary
Checks for file reading flaw in WebCalendar

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server has a PHP script that is affected by a local
file include flaw.

Description :

The remote installation of WebCalendar may allow a possible hacker to read
arbitrary files on the remote host by supplying a filename to the
'user_inc' argument of the file 'long.php'.

See also :

http://www.securityfocus.com/archive/1/329793
http://www.securityfocus.com/archive/1/330521/30/0/threaded
http://sourceforge.net/forum/forum.php?thread_id=901234&forum_id=11588

Solution :

Upgrade to WebCalendar 0.9.42 or later.

Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.