Описание
publish.ical.php in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier does not require authentication for write access to the calendars directory, which allows remote attackers to upload and execute arbitrary PHP scripts via a WebDAV PUT request with a filename containing a .php extension and a trailing null character.
Ссылки
- Exploit
- Exploit
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 2.2.1 (включая)
Одно из
cpe:2.3:a:php_icalendar:php_icalendar:*:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.0:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.0a2:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.0b:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.0c:*:*:*:*:*:*:*
cpe:2.3:a:php_icalendar:php_icalendar:2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05232
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
publish.ical.php in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier does not require authentication for write access to the calendars directory, which allows remote attackers to upload and execute arbitrary PHP scripts via a WebDAV PUT request with a filename containing a .php extension and a trailing null character.
EPSS
Процентиль: 90%
0.05232
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other