Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2006-0183
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Direct static code injection vulnerability in edit.php in ACal Calendar Project 2.2.5 allows authenticated users to execute arbitrary PHP code via (1) the edit=header value, which modifies header.php, or (2) the edit=footer value, which modifies footer.php. NOTE: this issue might be resultant from the poor authentication as identified by CVE-2006-0182. Since the design of the product allows the administrator to edit the code, perhaps this issue should not be included in CVE, except as a consequence of CVE-2006-0182..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.5/10
- Exploit Score
- 8/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- Single
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:acal:calendar_project:2.2.5:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://evuln.com/vulns/25/summary.html
- http://www.osvdb.org/22345
- http://secunia.com/advisories/18432
- http://securityreason.com/securityalert/343
- http://www.vupen.com/english/advisories/2006/0152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24107
- http://www.securityfocus.com/archive/1/421744/100/0/threaded