ID CVE-2006-0183
Summary Direct static code injection vulnerability in edit.php in ACal Calendar Project 2.2.5 allows authenticated users to execute arbitrary PHP code via (1) the edit=header value, which modifies header.php, or (2) the edit=footer value, which modifies footer.php. NOTE: this issue might be resultant from the poor authentication as identified by CVE-2006-0182. Since the design of the product allows the administrator to edit the code, perhaps this issue should not be included in CVE, except as a consequence of CVE-2006-0182.
References
Vulnerable Configurations
  • cpe:2.3:a:acal:calendar_project:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:acal:calendar_project:2.2.5:*:*:*:*:*:*:*
CVSS
Base: 6.5 (as of 19-10-2018 - 15:43)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
bugtraq 20060112 [eVuln] ACal Authentication Bypass & PHP Code Insertion
misc http://evuln.com/vulns/25/summary.html
osvdb 22345
secunia 18432
sreason 343
vupen ADV-2006-0152
xf acal-header-footer-code-execute(24107)
Last major update 19-10-2018 - 15:43
Published 12-01-2006 - 06:02
Last modified 19-10-2018 - 15:43
Back to Top