ID OSVDB:34272 Type osvdb Reporter OSVDB Modified 2007-05-28T00:00:00
Description
No description provided by the source
References:
Related OSVDB ID: 38336
Other Advisory URL: http://securityreason.com/securityalert/2744
Other Advisory URL: http://www.netvigilance.com/advisory0024
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-05/0407.html
ISS X-Force ID: 34542
CVE-2007-0690
{"cve": [{"lastseen": "2019-05-29T18:08:58", "bulletinFamily": "NVD", "description": "myEvent 1.6 allows remote attackers to obtain sensitive information via (1) a Log In action without a password to login.php, or an invalid (2) view[] or (3) monthno[] parameter to myevent.php, which reveals the path in various error messages.", "modified": "2018-10-16T16:33:00", "id": "CVE-2007-0690", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0690", "published": "2007-05-30T20:30:00", "title": "CVE-2007-0690", "type": "cve", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:22", "bulletinFamily": "software", "description": " netVigilance Security Advisory #24\r\n\r\nmyEvent version 1.6 Multiple Path Disclosure Vulnerabilities \r\n\r\nDescription:\r\nmyEvent is Dynamic Calendar based Events Management system with admin panel for adding events, edit and delete built using PHP & mySQL. Display today's event and future events links on the calendar, Event will be displayed in 3 mode eg : pop-up, new windows and on same screen once link is clicked. There is also a mouse-over tool tip to display the events Template based and Simple easily intergrated to any websites.\r\nExternal References: \r\nMitre CVE: CVE-2007-0690\r\nNVD NIST: CVE-2007-0690\r\nOSVDB: 34272\r\n\r\nSummary: \r\nmyEvent is Dynamic Calendar based Events Management system with admin panel for adding events, edit and delete built using PHP and mySQL.\r\n\r\nMultiple pass disclosure vulnerabilities in the product allow attackers to gather the true path of the server-side script.\r\n\r\n\r\nAdvisory URL: \r\nhttp://www.netvigilance.com/advisory0024 \r\n\r\nRelease Date:\r\n05/28/2007 \r\n\r\nSeverity:\r\nRisk: Low\r\n \r\nCVSS Metrics\r\nAccess Vector: Remote\r\nAccess Complexity: Low\r\nAuthentication: Not-required\r\nConfidentiality Impact: Partial\r\nIntegrity Impact: None\r\nAvailability Impact: None\r\nImpact Bias: Normal\r\nCVSS Base Score: 2.3\r\n \r\nTarget Distribution on Internet: Low\r\n \r\nExploitability: Functional Exploit\r\nRemediation Level: Workaround\r\nReport Confidence: Uncorroborated\r\n \r\nVulnerability Impact: Attack\r\nHost Impact: Path disclosure.\r\nSecureScout Testcase ID:\r\nTC 17954\r\n\r\nVulnerable Systems:\r\nmyEvent version 1.6\r\n\r\nVulnerability Type:\r\nProgram flaw - The myevent.php and login.php scripts has flaws which lead to Warnings or even Fatal Error.\r\n\r\nVendor:\r\nmyWebland\r\nVendor Status: \r\nThe Vendor has been notified several times on many different email addresses last on 15 May 2007. The Vendor has not responded. There is no official fix at the release of this Security Advisory.\r\n\r\nWorkaround:\r\nDisable warning messages: modify in the php.ini file following line: display_errors = Off. Or modify .htaccess file (this will work only for the apache servers). \r\nExample: \r\nPath Disclosure Vulnerability 1:\r\nREQUEST:\r\nhttp://[TARGET]/[PRODUCT-DIRECTORY]/myevent.php?monthno[]=2&year=2007\r\nREPLY:\r\n<b>Warning</b>: htmlspecialchars() expects parameter 1 to be string, array given in <b>[DISCLOSED PATH]\[PRODUCT-DIRECTORY]\initialize.php</b> on line <b>71</b><br />\r\nPath Disclosure Vulnerability 2:\r\nREQUEST\r\nhttp://[TARGET]/[PRODUCT-DIRECTORY]/ myevent.php?view[]=1\r\nREPLY:\r\n<b>Warning</b>: htmlspecialchars() expects parameter 1 to be string, array given in <b>[DISCLOSED PATH]\[PRODUCT-DIRECTORY]initialize.php</b> on line <b>83</b><br />\r\nPath Disclosure Vulnerability 3:\r\nREQUEST:\r\nhttp://[TARGET]/[PRODUCT-DIRECTORY]/login.php\r\nEnter Login but do not enter password. Click "Log In"\r\nREPLY:\r\n<b>Fatal error</b>: Call to undefined function: notice() in <b>[DISCLOSED PATH]\[PRODUCT-DIRECTORY]\login.php</b> on line <b>29</b><br />\r\nCredits: \r\nJesper Jurcenoks\r\nCo-founder netVigilance, Inc\r\nwww.netvigilance.com", "modified": "2007-05-29T00:00:00", "published": "2007-05-29T00:00:00", "id": "SECURITYVULNS:DOC:17121", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:17121", "title": "myEvent version 1.6 Multiple Path Disclosure Vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:26", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "modified": "2007-05-29T00:00:00", "published": "2007-05-29T00:00:00", "id": "SECURITYVULNS:VULN:7755", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7755", "title": "Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:34", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\n[Related OSVDB ID: 34272](https://vulners.com/osvdb/OSVDB:34272)\nOther Advisory URL: http://securityreason.com/securityalert/2744\nOther Advisory URL: http://www.netvigilance.com/advisory0024\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-05/0407.html\nISS X-Force ID: 34542\n[CVE-2007-0690](https://vulners.com/cve/CVE-2007-0690)\n", "modified": "2007-05-28T00:00:00", "published": "2007-05-28T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:38336", "id": "OSVDB:38336", "title": "myEvent myevent.php Multiple Variable Path Disclosure", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}