Proverbs Web Calendar 2.1.2 XSS (Cross-site Scripting) Security Vulnerabilities
Exploit Title: Proverbs Web Calendar /calendar.php Multiple Parameters XSS (Cross-site Scripting) Security Vulnerabilities
Product: Proverbs Web Calendar
Vulnerable Versions: 1.0.0 1.1 1.2.2 2.1 2.1.2
Tested Version: 1.2.2 2.1
Advisory Publication: April 03, 2015
Latest Update: April 03, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
Writer and Reporter: Wang Jing [CCRG, Nanyang Technological University (NTU), Singapore]
(1) Vendor & Product Description:
Product & Vulnerable Versions:
Proverbs Web Calendar
Proverbs Web Calendar can be obtained from here,
Product Introduction Overview:
“This is a web event calendar developed using PHP and powered by MySQL. The calendar is viewed in month format initially with a detailed view of daily events as each calendar day is clicked on. The calendar is customizable within a single file; allowing changes to the title, color choices, calendar language, starting day of the week, time format(24hr/12hr), time zone display and more”
(2) Vulnerability Details:
Proverbs Web Calendar web application has a security bug problem. It can be exploited by XSS attacks. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user’s browser session within the trust relationship between their browser and the server.
Several Proverbs Web Calendar products 0-day vulnerabilities have been found by some other bug hunter researchers before. Proverbs has patched some of them. The milw00rm.com is archive of exploits, videos, papers and vulnerabilities. It has published suggestions, advisories, solutions details related to Proverbs Web Calendar vulnerabilities.
(2.1) The first code programming flaw occurs at “/calendar.php” page with “&day”, “&month” and “&year” parameters.