Korean
<< Back
VID 21458
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PHP-Calendar software are vulnerable to a remote PHP Include vulnerability in the 'phpc_root_path' parameter of the 'calendar.php' and 'setup.php' scripts. PHP-Calendar is a Web based calendar implemented in PHP. PHP-Calendar versions 0.10.0 and earlier could allow a remote attacker to execute arbitrary commands on the affected host, when both the 'allow_url_fopen' and 'register_globals' directives are enabled. By specifying a malicious include file in the 'phpc_root_path' parameter of the 'calendar.php' or 'setup.php' script, a remote attacker could execute arbitrary code on the system with privileges of the Web server.

* References:
http://packetstormsecurity.nl/0412-exploits/phpcalendar.txt
http://www.gulftech.org/?node=research&article_id=00060-12292004

* Platforms Affected:
PHP-Calendar versions 0.10.0 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of January 2005.

Upgrade to the new version of PHP-Calendar, when new version fixed this problem becomes available from the PHP-Calendar Web page at http://php-calendar.sourceforge.net/

-- OR --

As a workaround, add the following lines to the top of the affected pages:

if ( !defined('IN_PHPC') ) {
die("Hacking attempt");
}

-- OR --

As another workaround for this and similar issues, disable the 'allow_url_fopen' and 'register_globals' directives in the local site PHP configuration.
Related URL CVE-2004-1423 (CVE)
Related URL 12127 (SecurityFocus)
Related URL 18710 (ISS)