Calendarix Basic cal_event.php id Variable SQL Injection

2006-06-15T07:19:15
ID OSVDB:26528
Type osvdb
Reporter Federico Fazzi(federico@autistici.org)
Modified 2006-06-15T07:19:15

Description

Vulnerability Description

Calendarix contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the cal_event.php script not properly sanitizing user-supplied input to the id variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Calendarix contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the cal_event.php script not properly sanitizing user-supplied input to the id variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/[c_path]/cal_event.php?id=[SQL_QUERY]

References:

Vendor URL: http://www.calendarix.com/ Secunia Advisory ID:20645 Related OSVDB ID: 26529 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0325.html FrSIRT Advisory: ADV-2006-2360 CVE-2006-3094