Vulnerabilities > CVE-2006-1291 - Unspecified vulnerability in PHP Icalendar PHP Icalendar

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
php-icalendar
nessus
exploit available

Summary

publish.ical.php in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier does not require authentication for write access to the calendars directory, which allows remote attackers to upload and execute arbitrary PHP scripts via a WebDAV PUT request with a filename containing a .php extension and a trailing null character.

Exploit-Db

descriptionphp iCalendar <= 2.21 (publish.ical.php) Remote Code Execution Exploit. CVE-2006-1291. Webapps exploit for php platform
fileexploits/php/webapps/1586.php
idEDB-ID:1586
last seen2016-01-31
modified2006-03-15
platformphp
port
published2006-03-15
reporterrgod
sourcehttps://www.exploit-db.com/download/1586/
titlephp iCalendar <= 2.21 publish.ical.php Remote Code Execution Exploit
typewebapps

Nessus

NASL familyCGI abuses
NASL idPHPICALENDAR_ICAL_FILE_UPLOAD.NASL
descriptionThe remote host appears to be running PHP iCalendar, a web-based iCal file viewer / parser written in PHP. The installed version of PHP iCalendar supports iCal publishing but does not properly restrict the types of files uploaded and places them in a web-accessible directory. An unauthenticated attacker can leverage this issue to upload files with arbitrary PHP code and then run that code subject to the privileges of the web server user id. Note that successful exploitation of this issue requires that
last seen2020-06-01
modified2020-06-02
plugin id21091
published2006-03-17
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/21091
titlePHP iCalendar publish.ical.php Arbitrary File Upload