Synopsis
The remote web server hosts a web application that is affected by a SQL injection vulnerability.
Description
The version of the ExtCalendar installed on the remote host is affected by a SQL injection vulnerability.
The application fails to properly sanitize user-supplied input to the 'cat_id' parameter of the 'calendar.php' script before using it in a database query.
Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated remote attacker can leverage this issue to launch a SQL injection attack against the affected application, leading to authentication bypass, discovery of sensitive information, attacks against the underlying database, and the like.
Solution
Either remove the affected install or switch to another application as ExtCalendar is no longer actively maintained.
Plugin Details
File Name: extcalendar_catid_sql_injection.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:extcalendar:extcalendar
Required KB Items: www/PHP, www/extcalendar
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Vulnerability Publication Date: 1/11/2011
Reference Information
BID: 45746