Vulnerability Description
publish.ical.php in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier does not require authentication for write access to the calendars directory, which allows remote attackers to upload and execute arbitrary PHP scripts via a WebDAV PUT request with a filename containing a .php extension and a trailing null character.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php Icalendar | Php Icalendar | <= 2.2.1 |
References
- http://downloads.securityfocus.com/vulnerabilities/exploits/php-iCalendar-221.upExploit
- http://secunia.com/advisories/19285
- http://www.securityfocus.com/bid/17129Exploit
- http://www.vupen.com/english/advisories/2006/1019
- https://www.exploit-db.com/exploits/1586
- http://downloads.securityfocus.com/vulnerabilities/exploits/php-iCalendar-221.upExploit
- http://secunia.com/advisories/19285
- http://www.securityfocus.com/bid/17129Exploit
- http://www.vupen.com/english/advisories/2006/1019
- https://www.exploit-db.com/exploits/1586
FAQ
What is CVE-2006-1291?
CVE-2006-1291 is a vulnerability with a CVSS score of 7.5 (HIGH). publish.ical.php in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier does not require authentication for write access to the calendars directory, which allows remote attackers to upload and execu...
How severe is CVE-2006-1291?
CVE-2006-1291 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1291?
Check the references section above for vendor advisories and patch information. Affected products include: Php Icalendar Php Icalendar.