|
|
| |
Credit:
The information has been provided by Secunia Research.
The original article can be found at: http://secunia.com/secunia_research/2008-28/
|
| |
Vulnerable Systems:
* Calendarix Basic version 0.8.20071118
Immune Systems:
* Calendarix Basic version 0.8.20080808
Input passed to the "catsearch" parameter in cal_search.php and "catview" in cal_cat.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation allows e.g. retrieval of administrator usernames and password hashes.
Solution:
Update to version 0.8.20080808.
Time Table:
23/06/2008 - Vendor contacted.
30/06/2008 - Vendor contacted (2nd attempt).
01/07/2008 - Vendor requests PoC.
01/07/2008 - Vendor provided with PoC.
01/07/2008 - Vendor response.
18/07/2008 - Status update requested.
20/07/2008 - Vendor response.
25/08/2008 - Public disclosure.
CVE Information:
CVE-2008-2429
|
|
|