| VID |
21850 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The PHP iCalendar is vulnerable to multiple remote file include vulnerabilities which exist in versions prior to 2.21. PHP iCalendar is a web-based calendar viewer / parser written in PHP. PHP iCalendar versions 2.0.1, 2.1, and 2.2 could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the "file" parameter of "functions/template.php" script and the "getdate" parameter of the "search.php" script. A remote attacker can send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://evuln.com/vulns/70/summary.html http://dimer.tamu.edu/phpicalendar.net/forums/viewtopic.php?p=1869#1869 http://www.securityfocus.com/archive/1/archive/1/424424/100/0/threaded http://www.frsirt.com/english/advisories/2006/0493 http://secunia.com/advisories/18778
* Platforms Affected: PHP iCalendar versions 2.0.1, 2.1, and 2.2 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of PHP iCalendar (2.21 or later), available from the SourceForge.net Download Web site at http://sourceforge.net/project/showfiles.php?group_id=62270 |
| Related URL |
CVE-2006-0648 (CVE) |
| Related URL |
16557 (SecurityFocus) |
| Related URL |
24591 (ISS) |
|