Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PHP:WEBCAL-INC

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

webcalendar php include http

Release Date

2007/01/17

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: WebCalendar Send_Reminders.PHP Remote File Inclusion


This signature detects attempts to exploit a known vulnerability against WebCalendar. A successful attack can lead to arbitrary code execution.

Extended Description

WebCalendar is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

Affected Products

  • k5n WebCalendar 1.0.0
  • k5n WebCalendar 1.0.0 RC1
  • k5n WebCalendar 1.0.0 rc2
  • k5n WebCalendar 1.0.0 RC3

References

  • BugTraq: 14651
  • URL: http://sourceforge.net/project/shownotes.php?release_id=350336
  • URL: http://www.acunetix.com/vulnerabilities/WebCalendar-v.1.00--Remot.htm

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out