Lucene search

K

EV0063.txt

🗓️ 17 Feb 2006 00:00:00Reported by Aliaksandr HartsuyeuType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 26 Views

New eVuln Advisory: PHP Event Calendar XSS & User's Data Corruption Vulnerabilities. Registered user can change Username and Password without proper sanitization, enabling XSS attack or data corruption

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
ReporterTitlePublishedViews
Family
Prion
Cross site scripting
13 Feb 200611:06
prion
NVD
CVE-2006-0657
13 Feb 200611:06
nvd
securityvulns
[eVuln] PHP Event Calendar XSS & User's Data Corruption Vulnerabilities
17 Feb 200600:00
securityvulns
CVE
CVE-2006-0657
13 Feb 200611:06
cve
Cvelist
CVE-2006-0657
13 Feb 200611:00
cvelist
`New eVuln Advisory:  
PHP Event Calendar XSS & User's Data Corruption Vulnerabilities  
http://evuln.com/vulns/63/summary.html  
  
--------------------Summary----------------  
eVuln ID: EV0063  
CVE: CVE-2006-0657  
Vendor: Softcomplex  
Vendor's Web Site: http://www.softcomplex.com/  
Software: PHP Event Calendar  
Sowtware's Web Site: http://www.softcomplex.com/products/php_event_calendar/  
Versions: 1.5  
Critical Level: Harmless  
Type: Cross-Site Scripting  
Class: Remote  
Status: Unpatched. No reply from developer(s)  
Exploit: Available  
Solution: Not Available  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
-----------------Description---------------  
Registered user has an ability to change his Username and Password.  
Username and Password isn't sanitized before being written to users.php file. This can be used to make XSS attack or corrupt users data.  
  
  
  
--------------Exploit----------------------  
Available at: http://evuln.com/vulns/63/exploit.html  
  
1. Cross-Site Scripting Example.  
  
Changing password.  
Username: <XSS>  
Password: userpassword  
  
  
2. Password file corruption.  
  
Changing password.  
Username: any  
Password: ? ><?  
  
--------------Solution---------------------  
No Patch available.  
  
--------------Credit-----------------------  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
  
Regards,  
Aliaksandr Hartsuyeu  
http://evuln.com  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo