{"vuid":"VU#925166","idnumber":"925166","name":"PhpWebSite calendar module contains a SQL injection vulnerability","keywords":["phpWebSite","SQL injection","cal_template"],"overview":"The PhpWebSite contains an SQL injection vulnerability that may allow malicious users to execute SQL queries on a server with the privileges of the PhpWebSite administrator.","clean_desc":"PhpWebSite is an open-source web content management system that includes a web-based calendar module to let users to create, post, and view events on a PhpWebSite managed site. By default users must have requests for new events approved by a site administrator before they are added to the calendar. However, lack of input validation of the cal_template variable may allow malicious users to inject a SQL query into the new event. If a site administrator approves the event the SQL query will be executed.","impact":"A remote attacker may be able to execute SQL queries on a server with the privileges of a PhpWebSite administrator.","resolution":"Apply a Patch PhpWebsite has released a patch to address this issue available at: http://www.phpwebsite.appstate.edu/downloads/security/phpwebsite-core-security-patch.tar.gz.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly reported by GulfTech Security.","author":"This document was written by Jeff Gennari.","public":["http://www.gulftech.org/?node=research&article_id=00048-08312004","http://www.securitytracker.com/alerts/2004/Aug/1011120.html","http://www.securityfocus.com/archive/1/332561","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0735","http://marc.theaimsgroup.com/?l=bugtraq&m=106062021711496&w=2","http://www.osvdb.org/displayvuln.php?osvdb_id=9444","http://www.phpwebsite.appstate.edu/index.php?module=announce&ANN_user_op=view&ANN_id=822"],"cveids":["CVE-2003-0735"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-02T17:54:39Z","publicdate":"2004-08-31T00:00:00Z","datefirstpublished":"2004-10-19T20:44:22Z","dateupdated":"2004-10-19T20:44:28Z","revision":131,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"19","cam_exploitation":"0","cam_internetinfrastructure":"2","cam_population":"4","cam_impact":"9","cam_easeofexploitation":"1","cam_attackeraccessrequired":"14","cam_scorecurrent":"0.19845","cam_scorecurrentwidelyknown":"0.2079","cam_scorecurrentwidelyknownexploited":"0.3969","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.19845,"vulnote":null}