Korean
<< Back
VID 21485
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WebCalendar program is vulnerable to an SQL injection vulnerability via the webcalendar_session cookie. WebCalendar is a graphical PHP application used to maintain a calendar for a single user or an intranet group of users. WebCalendar version 0.9.45 and possibly other versions are vulnerable to SQL Injection attacks launched through an encoded cookie that is inserted into a request. A remote attacker could send a specially-crafted URL request to the views.php script containing SQL code in an encoded webcalendar_session cookie. As a result, this could allow a remote attacker to obtain sensitive information and add, modify or delete data in the backend database.

* References:
http://www.scovettalabs.com/advisory/SCL-2005.001.txt
http://secunia.com/advisories/14319

* Platforms Affected:
Craig Knudsen, WebCalendar versions 0.9.45 and earlier
Linux Any version
Microsoft Windows Any version
Unix Any version
Recommendation Upgrade to the latest version of Webcalendar (1.0RC2 or later), available from the WebCalendar Download Web site http://www.k5n.us/webcalendar.php?topic=Download

-- OR --

As a workaround, apply the patch for this vulnerability, available from the Scovetta Labs Security Advisory dated 2005-02-16 at http://www.scovettalabs.com/advisory/SCL-2005.001.txt
Related URL CVE-2005-0474 (CVE)
Related URL 12581 (SecurityFocus)
Related URL 19369 (ISS)