AOH :: HP Unsorted X :: BU-1430.HTM

Active Calendar 1.2.0 XSS Vulnerability Marty Barbella]



XSS Vulnerability in Active Calendar 1.2.0
XSS Vulnerability in Active Calendar 1.2.0



XSS Vulnerability in Active Calendar 1.2.0

Discovered by Martin Barbella  

Description of Vulnerability:
-----------------------------
Active Calendar is PHP Class, that generates calendars (year, month or
week view) as a HTML Table (XHTML-Valid). (From:
http://micronetwork.de/activecalendar/index.php) 

In the functions enableYearNav, enableMonthNav, enableDayLinks, and
enableDatePicker of the activeCalendar class, certain variables are
assigned the value of $_SERVER['PHP_SELF'] when either no value is
specified for $link, or the value of $link is false. The values of
these variables are not sanitized later, resulting in several cross
site scripting vulnerabilities.

Systems affected:
-----------------
This has been confirmed in version 1.2.0 of Active Calendar. Previous
versions may also be affected.

Impact:
-------
When a user is tricked into clicking on a malicious link or submitting
a specially crafted form, the injected code travels to the vulnerable
web server, which reflects the attack back to the user's browser. The
browser then executes the code because it came from a "trusted"
server. (From OWASP:
http://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29) 

Mitigating factors:
-------------------
The vulnerabilities will only affect applications which call the four
functions above with the default values, or applications which call
the above functions with false passed as the value of the $link
parameter.

Proof of concept:
-----------------
The code segment shows a basic example of how Active Calendar could be
used with a call to one of the four vulnerable functions.

enableDayLinks();
?>
\n"; ?>
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 

  
    Active Calendar XSS Example
  
  
    
showYear(); ?>
If this script was located at http://site/test.php, the vulnerability could be demonstrated by viewing . Workaround: ----------- When using the activeCalendar class, explicitly pass a sanitized value for the $link parameter when calling the functions enableYearNav, enableMonthNav, enableDayLinks, and enableDatePicker.

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.