ID EDB-ID:29647 Type exploitdb Reporter Simon Bonnard Modified 2007-02-24T00:00:00
Description
Active Calendar 1.2 data/js.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/22705/info
Active Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Active Calendar 1.2.0 is vulnerable; other versions may also be affected.
http://www.example.com/activecalendar/data/js.php?css="><script>alert(document.cookie)</script>
{"id": "EDB-ID:29647", "hash": "932813cd9de167957d7fca811a7fd3fd", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Active Calendar 1.2 data/js.php css Parameter XSS", "description": "Active Calendar 1.2 data/js.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "published": "2007-02-24T00:00:00", "modified": "2007-02-24T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/29647/", "reporter": "Simon Bonnard", "references": [], "cvelist": ["CVE-2007-1111"], "lastseen": "2016-02-03T10:48:57", "history": [], "viewCount": 1, "enchantments": {"score": {"value": 5.8, "vector": "NONE", "modified": "2016-02-03T10:48:57"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-1111"]}, {"type": "osvdb", "idList": ["OSVDB:33145", "OSVDB:33153", "OSVDB:33151", "OSVDB:33152", "OSVDB:33149", "OSVDB:33147", "OSVDB:33150", "OSVDB:33146", "OSVDB:33148"]}, {"type": "exploitdb", "idList": ["EDB-ID:29648", "EDB-ID:29646", "EDB-ID:29651", "EDB-ID:29649", "EDB-ID:29653", "EDB-ID:29652", "EDB-ID:29650"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7305"]}], "modified": "2016-02-03T10:48:57"}, "vulnersScore": 5.8}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/29647/", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/js.php?css=\"><script>alert(document.cookie)</script> \r\n", "osvdbidlist": ["33146"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:08:58", "bulletinFamily": "NVD", "description": "Multiple cross-site scripting (XSS) vulnerabilities in ActiveCalendar 1.2.0 allow remote attackers to inject arbitrary web script or HTML via the css parameter to (1) flatevents.php, (2) js.php, (3) mysqlevents.php, (4) m_2.php, (5) m_3.php, (6) m_4.php, (7) xmlevents.php, (8) y_2.php, or (9) y_3.php in data/.", "modified": "2018-10-16T16:36:00", "id": "CVE-2007-1111", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1111", "published": "2007-02-26T17:28:00", "title": "CVE-2007-1111", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'y_2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'y_2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/y_2.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33152", "id": "OSVDB:33152", "title": "ActiveCalendar data/y_2.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'flatevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'flatevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/flatevents.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33145", "id": "OSVDB:33145", "title": "ActiveCalendar data/flatevents.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'xmlevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'xmlevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/xmlevents.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33151", "id": "OSVDB:33151", "title": "ActiveCalendar data/xmlevents.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'y_3.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'y_3.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/y_3.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33153", "id": "OSVDB:33153", "title": "ActiveCalendar data/y_3.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'mysqlevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'mysqlevents.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/mysqlevents.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-23T20:34:54", "published": "2007-02-23T20:34:54", "href": "https://vulners.com/osvdb/OSVDB:33147", "id": "OSVDB:33147", "title": "ActiveCalendar data/mysqlevents.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_3.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_3.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/m_3.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33149", "id": "OSVDB:33149", "title": "ActiveCalendar data/m_3.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_4.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrit\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_4.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrit\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/m_4.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33150", "id": "OSVDB:33150", "title": "ActiveCalendar data/m_4.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'js.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'js.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/js.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33148](https://vulners.com/osvdb/OSVDB:33148)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33146", "id": "OSVDB:33146", "title": "ActiveCalendar data/js.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:29", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nActiveCalendar contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'css' variables upon submission to the 'm_2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[VICTIM]/activecalendar/data/m_2.php?css=\"><script>alert(document.cookie)</script>\n## References:\nVendor URL: http://www.micronetwork.de/activecalendar/\n[Related OSVDB ID: 33147](https://vulners.com/osvdb/OSVDB:33147)\n[Related OSVDB ID: 33150](https://vulners.com/osvdb/OSVDB:33150)\n[Related OSVDB ID: 33152](https://vulners.com/osvdb/OSVDB:33152)\n[Related OSVDB ID: 33144](https://vulners.com/osvdb/OSVDB:33144)\n[Related OSVDB ID: 33146](https://vulners.com/osvdb/OSVDB:33146)\n[Related OSVDB ID: 33153](https://vulners.com/osvdb/OSVDB:33153)\n[Related OSVDB ID: 33145](https://vulners.com/osvdb/OSVDB:33145)\n[Related OSVDB ID: 33149](https://vulners.com/osvdb/OSVDB:33149)\n[Related OSVDB ID: 33151](https://vulners.com/osvdb/OSVDB:33151)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-02/0467.html\nISS X-Force ID: 32690\nFrSIRT Advisory: ADV-2007-0759\n[CVE-2007-1111](https://vulners.com/cve/CVE-2007-1111)\nBugtraq ID: 22705\n", "modified": "2007-02-24T07:17:11", "published": "2007-02-24T07:17:11", "href": "https://vulners.com/osvdb/OSVDB:33148", "id": "OSVDB:33148", "title": "ActiveCalendar data/m_2.php css Variable XSS", "type": "osvdb", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-03T10:48:46", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/flatevents.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29646", "href": "https://www.exploit-db.com/exploits/29646/", "type": "exploitdb", "title": "Active Calendar 1.2 data/flatevents.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n\r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n\r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/flatevents.php?css=\"><script>alert(document.cookie)</script>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29646/"}, {"lastseen": "2016-02-03T10:49:07", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/m_2.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29648", "href": "https://www.exploit-db.com/exploits/29648/", "type": "exploitdb", "title": "Active Calendar 1.2 data/m_2.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/m_2.php?css=\"><script>alert(document.cookie)</script>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29648/"}, {"lastseen": "2016-02-03T10:49:40", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/y_2.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29651", "href": "https://www.exploit-db.com/exploits/29651/", "type": "exploitdb", "title": "Active Calendar 1.2 data/y_2.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/y_2.php?css=\"><script>alert(document.cookie)</script>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29651/"}, {"lastseen": "2016-02-03T10:49:32", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/m_4.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29650", "href": "https://www.exploit-db.com/exploits/29650/", "type": "exploitdb", "title": "Active Calendar 1.2 data/m_4.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/m_4.php?css=\"><script>alert(document.cookie)</script>\r\n\r\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29650/"}, {"lastseen": "2016-02-03T10:49:49", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/y_3.php css Parameter XSS. CVE-2007-1111 . Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29652", "href": "https://www.exploit-db.com/exploits/29652/", "type": "exploitdb", "title": "Active Calendar 1.2 data/y_3.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\n http://www.example.com/activecalendar/data/y_3.php?css=\"><script>alert(document.cookie)</script>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29652/"}, {"lastseen": "2016-02-03T10:49:57", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/mysqlevents.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29653", "href": "https://www.exploit-db.com/exploits/29653/", "type": "exploitdb", "title": "Active Calendar 1.2 data/mysqlevents.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/mysqlevents.php?css=\"><script>alert(document.cookie)</script>", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29653/"}, {"lastseen": "2016-02-03T10:49:21", "bulletinFamily": "exploit", "description": "Active Calendar 1.2 data/m_3.php css Parameter XSS. CVE-2007-1111. Webapps exploit for php platform", "modified": "2007-02-24T00:00:00", "published": "2007-02-24T00:00:00", "id": "EDB-ID:29649", "href": "https://www.exploit-db.com/exploits/29649/", "type": "exploitdb", "title": "Active Calendar 1.2 data/m_3.php css Parameter XSS", "sourceData": "source: http://www.securityfocus.com/bid/22705/info\r\n \r\nActive Calendar is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n \r\nActive Calendar 1.2.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/activecalendar/data/m_3.php?css=\"><script>alert(document.cookie)</script>\r\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/29649/"}], "securityvulns": [{"lastseen": "2018-08-31T11:09:24", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2007-02-25T00:00:00", "published": "2007-02-25T00:00:00", "id": "SECURITYVULNS:VULN:7305", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7305", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}]}