[VIM] Missed PHP file include in recent Calendarix

Steven M. Christey coley at mitre.org
Mon Jun 6 23:51:35 EDT 2005


reference:

  BUGTRAQ:20050531 multiple vulnerability Calendarix Advanced
  URL:http://archives.neohapsis.com/archives/bugtraq/2005-05/0356.html


Multiple VDBs seem to have missed the following portion of the post:

        Include

        line 16
        admin/cal_admintop.php:include_once($calpath."cal_utils.php");

I downloaded the demo version of Calendarix, and there are only 2
previous PHP statements before this line - both include statements,
neither of which seems to define $calpath, which is defined in
cal_config.php.  cal_admintop.php itself is included a number of times
in other files.

Thus it appears to be a typical file include issue where an include
file depends on variables defined by previously included files, but is
directly callable assuming the relevant PHP configuration
etc. etc. etc.

Also, at least two of the SQL injection issues in the "catview"
parameter seem to lead to the same eventqry function as defined in
cal_utils.php.

cal_day.php line 112:

  $result = eventqry($vda,$vdm,$year,$uname,$order,true,$catview) ;

cal_week.php line 193:

	$result = eventqry($fdd,$fdm,$fdy,$uname,$order,true,$catview) ;

cal_cat.php lines 34 through 39 have their own vulnerable select
calls, though:

  if (($ALLOWVIEW[6]==1)&&($catview!=0)) 
	$query = "select cat_id,cat_name,cat_color,parent_id from ".$CAT_TB." where cat_id=$catview";

  if ($ALLOWVIEW[11]==1)
	$query = "select cat_id,cat_name,cat_color,parent_id from ".$CAT_TB." where cat_id=$catview or parent_id=$catview";


This was based solely on source code inspection of the demo version of
Calendarix Advanced.

I'll be sending an inquiry to the developer shortly.

- Steve


More information about the VIM mailing list