FKIE_CVE-2012-5385
Vulnerability from fkie_nvd - Published: 2012-10-11 15:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
install/index.php in Craig Knudsen WebCalendar before 1.2.5 allows remote attackers to modify settings.php and possibly execute arbitrary code via vectors related to the user theme preference.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| webcalendar_project | webcalendar | 1.0 | |
| webcalendar_project | webcalendar | 1.0 | |
| webcalendar_project | webcalendar | 1.0 | |
| webcalendar_project | webcalendar | 1.1.1 | |
| webcalendar_project | webcalendar | 1.1.2 | |
| webcalendar_project | webcalendar | 1.1.3 | |
| webcalendar_project | webcalendar | 1.1.4 | |
| webcalendar_project | webcalendar | 1.1.5 | |
| webcalendar_project | webcalendar | 1.1.6 | |
| webcalendar_project | webcalendar | 1.2 | |
| webcalendar_project | webcalendar | 1.2.0 | |
| webcalendar_project | webcalendar | 1.2.1 | |
| webcalendar_project | webcalendar | 1.2.2 | |
| webcalendar_project | webcalendar | 1.2.3 | |
| webcalendar_project | webcalendar | 1.2.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9C15E268-8EB4-47A8-90DC-CD69CD50A841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "91FEC4D3-4834-4280-8303-17DB2AFF5B02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A495A3A9-D5D4-4520-BD08-E1ED14739011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A080963-2939-4A64-AB20-88BCAE38493D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C91371D-782F-4F37-ACA2-DDCBCA07EADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05214A0F-8AF1-411D-A95D-C27E30DDDB90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C4150C-F794-43E8-8830-306256B762A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7936AA3F-AF11-450E-B4C4-01435362A8BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4761E3-3CC3-415C-B465-81D027A8873F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "131F1948-C0F4-474B-B56B-B5F475B1E1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE8D526-A7ED-4AAA-9B55-81AFA5761848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E2AE19F-7C9B-4AB3-8E7F-8FA7EDE0125F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8810AF0D-2304-43B7-9507-DD429587E975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EE45F7F3-C367-4E0C-973E-43907482B696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:webcalendar_project:webcalendar:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FC83A8FD-0B1F-43DE-9DD3-EDDE8E8E7DD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "install/index.php in Craig Knudsen WebCalendar before 1.2.5 allows remote attackers to modify settings.php and possibly execute arbitrary code via vectors related to the user theme preference."
},
{
"lang": "es",
"value": "install/index.php en Craig Knudsen WebCalendar anteriores a v1.2.5 permite a atacantes remotos a modificar settings.php y posiblemente ejecutar comandos a trav\u00e9s de vectores relacionados con las preferencias de tema de usuario."
}
],
"id": "CVE-2012-5385",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-10-11T15:55:03.627",
"references": [
{
"source": "cve@mitre.org",
"url": "http://webcalendar.cvs.sourceforge.net/viewvc/webcalendar/webcalendar/ChangeLog?pathrev=REL_1_2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://webcalendar.cvs.sourceforge.net/viewvc/webcalendar/webcalendar/ChangeLog?pathrev=REL_1_2"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…