install/index.php in WebCalendar before 1.2.5 allows remote attackers to execute arbitrary code via the form_single_user_login parameter.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://sourceforge.net/projects/webcalendar/files/webcalendar%201.2/1.2.5/ | third party advisory release notes |
https://www.exploit-db.com/exploits/18775 | third party advisory vdb entry exploit |
https://packetstormsecurity.com/files/112332/WebCalendar-1.2.4-Remote-Code-Execution.html | third party advisory vdb entry exploit |
https://packetstormsecurity.com/files/112323/WebCalendar-1.2.4-Pre-Auth-Remote-Code-Injection.html | third party advisory vdb entry exploit |