Korean
<< Back
VID 21823
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpScheduleIt, according to its version number, has a security bypass vulnerability in reservation.class.php. phpScheduleIt is an open-source Web-based reservation and scheduling system written in PHP. phpScheduleIt versions prior to 1.0.1 could allow an attacker to bypass certain security restrictions, caused by an unspecified vulnerability in the reservation.class.php script. The attacker could exploit this vulnerability to modify or delete reservations.

* Note: This check solely relied on the version number of phpScheduleIt installed on the remote Web server to assess this vulnerability.

* References:
http://sourceforge.net/tracker/index.php?func=detail&aid=1051841&group_id=95547&atid=611778
http://secunia.com/advisories/13206
http://securitytracker.com/alerts/2004/Nov/1012246.html

* Platforms Affected:
BrickHost, phpScheduleIt versions prior to 1.0.1
Any operating system Any version
Recommendation Upgrade to the latest version of phpScheduleIt (1.0.1 or later), available from the phpScheduleIt Web site at http://www.php.brickhost.com/
Related URL CVE-2004-2469 (CVE)
Related URL 11690 (SecurityFocus)
Related URL 18089 (ISS)