PHP iCalendar publish.ical.php Arbitrary File Upload

high Nessus Plugin ID 21091

Synopsis

The remote web server contains a PHP application that is affected by an arbitrary file upload vulnerability.

Description

The remote host appears to be running PHP iCalendar, a web-based iCal file viewer / parser written in PHP.

The installed version of PHP iCalendar supports iCal publishing but does not properly restrict the types of files uploaded and places them in a web-accessible directory. An unauthenticated attacker can leverage this issue to upload files with arbitrary PHP code and then run that code subject to the privileges of the web server user id.

Note that successful exploitation of this issue requires that '$phpicalendar_publishing' be enabled in 'config.inc.php', which is not the default.

Solution

Edit the application's 'config.inc.php' file and set '$phpicalendar_publishing' to 0.

See Also

http://www.nessus.org/u?05452718

Plugin Details

Severity: High

ID: 21091

File Name: phpicalendar_ical_file_upload.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 3/17/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php_icalendar:php_icalendar

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 3/15/2006

Reference Information

CVE: CVE-2006-1291

BID: 17129