| VID |
21485 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WebCalendar program is vulnerable to an SQL injection vulnerability via the webcalendar_session cookie. WebCalendar is a graphical PHP application used to maintain a calendar for a single user or an intranet group of users. WebCalendar version 0.9.45 and possibly other versions are vulnerable to SQL Injection attacks launched through an encoded cookie that is inserted into a request. A remote attacker could send a specially-crafted URL request to the views.php script containing SQL code in an encoded webcalendar_session cookie. As a result, this could allow a remote attacker to obtain sensitive information and add, modify or delete data in the backend database.
* References: http://www.scovettalabs.com/advisory/SCL-2005.001.txt http://secunia.com/advisories/14319
* Platforms Affected: Craig Knudsen, WebCalendar versions 0.9.45 and earlier Linux Any version Microsoft Windows Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Webcalendar (1.0RC2 or later), available from the WebCalendar Download Web site http://www.k5n.us/webcalendar.php?topic=Download
-- OR --
As a workaround, apply the patch for this vulnerability, available from the Scovetta Labs Security Advisory dated 2005-02-16 at http://www.scovettalabs.com/advisory/SCL-2005.001.txt |
| Related URL |
CVE-2005-0474 (CVE) |
| Related URL |
12581 (SecurityFocus) |
| Related URL |
19369 (ISS) |
|