cve/2006/CVE-2006-0183.md
2024-06-18 02:51:15 +02:00

18 lines
982 B
Markdown

### [CVE-2006-0183](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0183)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Direct static code injection vulnerability in edit.php in ACal Calendar Project 2.2.5 allows authenticated users to execute arbitrary PHP code via (1) the edit=header value, which modifies header.php, or (2) the edit=footer value, which modifies footer.php. NOTE: this issue might be resultant from the poor authentication as identified by CVE-2006-0182. Since the design of the product allows the administrator to edit the code, perhaps this issue should not be included in CVE, except as a consequence of CVE-2006-0182.
### POC
#### Reference
- http://evuln.com/vulns/25/summary.html
#### Github
No PoCs found on GitHub currently.