Calendarix calendar.php Multiple Parameter SQL Injection

medium Nessus Plugin ID 25567

Synopsis

The remote web server contains a PHP script that is prone to SQL injection attacks.

Description

The remote host is running Calendarix, a free web-based calendar application written in PHP.

The version of Calendarix installed on the remote host fails to sanitize input to the 'month' and 'year' parameters of the 'calendar.php' script before using it in database queries. Provided PHP's 'magic_quotes_gpc' setting is disabled, an unauthenticated attacker can exploit these flaws to manipulate database queries, which may lead to disclosure of sensitive information, modification of data, or attacks against the underlying database.

Solution

Unknown at this time.

See Also

http://www.netvigilance.com/advisory0038

https://www.securityfocus.com/archive/1/472221/30/0/threaded

Plugin Details

Severity: Medium

ID: 25567

File Name: calendarix_month_sql_injection.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 6/26/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/25/2007

Reference Information

CVE: CVE-2007-3183

BID: 24633