Advertisement






PHP iCalendar File Inclusion Vulnerability

CVE Category Price Severity
CVE-2007-6077 CWE-98 Not specified High
Author Risk Exploitation Type Date
Patrick Webster High Remote 2006-02-15
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.84 0.96

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006020029

Below is a copy:

New eVuln Advisory:
PHP iCalendar File Inclusion Vulnerability
http://evuln.com/vulns/70/summary.html

--------------------Summary----------------
eVuln ID: EV0070
Software: PHP iCalendar
Sowtware's Web Site: http://phpicalendar.net/
Versions: 2.0.1 2.1 2.2
Critical Level: Dangerous
Type: File Inclusion
Class: Remote
Status: Patched
Exploit: Not Available
Solution: Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-----------------Description---------------
File: functions/template.php
Function parse($file) calls include($file) without correct sanitation of variable $file

File: search.php
Parameter getdate isn't properly sanitized and may contain a filepath.

All this can be used to make inclusion of arbitrary server-side file.

System access is possible.

--------------Exploit----------------------
Exploitation code will be published in 3 days
http://evuln.com/vulns/70/exploit.html

--------------Solution---------------------
Vendor-provided patch is available at:

http://dimer.tamu.edu/phpicalendar.net/forums/viewtopic.php?p=1869#1869

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum