PHP Event Calendar before 2021-09-03 allows SQL injection, as demonstrated by the /server/ajax/user_manager.php username parameter. This can be used to execute SQL statements directly on the database, allowing an adversary in some cases to completely compromise the database system. It can also be used to bypass the login form.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-11-08 04:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42077
Mitre link : CVE-2021-42077
CVE.ORG link : CVE-2021-42077
JSON object : View
Products Affected
kaysongroup
- php_event_calendar
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')