{ "id": "CVE-2008-5967", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-26T20:30:00.280", "lastModified": "2025-04-09T00:30:58.490", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "admin/index.php in PHP iCalendar 2.3.4, 2.24, and earlier does not require administrative authentication for an addupdate action, which allows remote attackers to upload a calendar (aka .ics) file with arbitrary content to the calendars/ directory outside the web root." }, { "lang": "es", "value": "El acceso a admin/index.php en PHP icalendar 2.3.4, 2.24 y anteriores no requiere autenticaci\u00f3n de administraci\u00f3n apara las acciones addupdate, lo que permite a atacantes remotos subir un calendario (un fichero .ics) con contenidos arbitrarios al directorio calendars/ fuera de la ra\u00edz del \u00e1rbol de directorios de la interfaz web." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.3.4", "matchCriteriaId": "C84A452E-4EE3-4ACB-A13C-AE058426633F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D76E93A8-0EF2-4A84-A3FE-17A57BDF1EB0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "306B2B11-1E73-4E64-B716-71D1CE64C6BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "959D9A75-85AE-4873-AD8C-F3377F8280FF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "CD1D51DD-FEFD-4939-A681-5BF471109CCE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "17E5A766-5E62-4001-BAD3-A77547855F8B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F22EE8BE-F51A-4139-B45B-74C100FC3370" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.0:beta:*:*:*:*:*:*", "matchCriteriaId": "FEF861BA-987A-452F-B6E1-3B6A78C80565" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "207B8342-E3D0-419B-88B3-72F6394DA5CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.0c:*:*:*:*:*:*:*", "matchCriteriaId": "46645062-B97C-4B34-B0E3-6C2182C12573" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "80CF2891-5AF4-47FC-8AAE-4A90B45236DF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C24EC36-26ED-4217-BF6E-E00CF0E2A05E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "E292DC2D-1936-43AB-B34B-A6362BC755B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "A7E54DE8-938E-44B0-B6A4-99B54B62EAB6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "974A0766-EFA9-4A0C-B668-0C1C92A851DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.23:rc1:*:*:*:*:*:*", "matchCriteriaId": "6023B70C-BC45-4338-AA40-9C2782EC3C0E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpicalendar:phpicalendar:2.24:*:*:*:*:*:*:*", "matchCriteriaId": "B07C3CE2-9328-43C0-BB81-463767400DA5" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/31944", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48323", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/6519", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/31944", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48323", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://www.exploit-db.com/exploits/6519", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }