CVE-2006-0183
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Direct static code injection vulnerability in edit.php in ACal Calendar Project 2.2.5 allows authenticated users to execute arbitrary PHP code via (1) the edit=header value, which modifies header.php, or (2) the edit=footer value, which modifies footer.php. NOTE: this issue might be resultant from the poor authentication as identified by CVE-2006-0182. Since the design of the product allows the administrator to edit the code, perhaps this issue should not be included in CVE, except as a consequence of CVE-2006-0182..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.5/10
- Exploit Score
- 8/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- Single
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:acal:calendar_project:2.2.5:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://evuln.com/vulns/25/summary.html
- http://www.osvdb.org/22345
- http://secunia.com/advisories/18432
- http://securityreason.com/securityalert/343
- http://www.vupen.com/english/advisories/2006/0152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24107
- http://www.securityfocus.com/archive/1/421744/100/0/threaded