PHP Event Calendar Multiple Parameter Cross Site Scripting Vulnerability

2006.09.19
Credit: OS2A BTO
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Multiple Cross Site Scripting Vulnerabilities were identified in SoftComplex Inc. 's PHP Event Calendar, a reusable PHP script that extends a web site's functionality with an event scheduler or news archive. http://www.softcomplex.com/products/php_event_calendar/ Attached is the advisory which details the vulnerability. Thanks, OS2A PHP Event Calendar Multiple Parameter Cross Site Scripting Vulnerability OS2A ID: OS2A_1007 Status: 08/20/2006 Issue Discovered 09/06/2006 Reported to the Vendor 09/09/2006 Fixed by Vendor 09/13/2006 Advisory Released Class: Cross Site Scripting Severity: Low Overview: --------- PHP Event Calendar is a reusable PHP script that extends a web site's functionality with an event scheduler and/or news archive. http://www.softcomplex.com/products/php_event_calendar/ Description: ------------ A cross-site scripting vulnerability exists in PHP Event Calendar, due to input validation error in parameters tilte(ti), body(bi) and backgroung Image(cbgi) in cl_files/index.php page when adding a new event. Successful exploitation requires authentication. Impact: ------- An authenticated remote attacker could inject malicious HTML and script code in other user's browser session within the security context of the affected site. Affected Software(s): --------------------- PHP Event Calendar 1.5.1 (prior versions may also be vulnerable) Proof of Concept: ----------------- http://www.yoursite.com/directory_where_you_installed_php_event_calendar /cl_files/index.php Vulnerable fields: title field - ti body field - bi Backgroung Image - cbgi Insert "<script>alert('XSS Vulnerable');</script>" in above field and click "Add event". CVSS Score Report: ----------------- ACCESS_VECTOR = REMOTE ACCESS_COMPLEXITY = LOW AUTHENTICATION = REQUIRED CONFIDENTIALITY_IMPACT = NONE INTEGRITY_IMPACT = PARTIAL AVAILABILITY_IMPACT = NONE IMPACT_BIAS = INTEGRITY EXPLOITABILITY = PROOF_OF_CONCEPT REMEDIATION_LEVEL = OFFICIAL_FIX REPORT_CONFIDENCE = CONFIRMED CVSS Base Score = 2.1 (AV:R/AC:L/Au:R/C:N/I:P/A:N/B:I) CVSS Temporal Score = 1.6 Risk factor = Low Vendor Response: --------------- "Attached is the version that blocks the use of the <script> in the text of the event. We can't block use of HTML completely because many users want to be able to use HTML for the event descriptions. The events are managed in the password protected control panel so there was no security threat even before the change was applied." Solution: --------- Update to the fixed version, http://www.softcomplex.com/products/php_event_calendar/ Credits: -------- NR Nandini of OS2A has been credited with the discovery of this vulnerability.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top