FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

plans -- multiple vulnerabilities

Affected packages
plans < 6.7.2

Details

VuXML ID 1709084d-4d21-11db-b48d-00508d6a62df
Discovery 2005-04-28
Entry 2006-09-26
Modified 2006-10-15

Secunia reports:

A vulnerability has been reported in Plans, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "evt_id" parameter in "plans.cgi" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation requires that SQL database support has been enabled in "plans_config.pl" (the default setting is flat files).

Some vulnerabilities have been reported in Plans, which can be exploited by malicious people to conduct cross-site scripting attacks or gain knowledge of sensitive information.

Input passed to various unspecified parameters is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

An unspecified error can be exploited to gain knowledge of the MySQL password.

References

Bugtraq ID 14069
URL http://planscalendar.com/forum/viewtopic.php?t=660
URL http://secunia.com/advisories/15167/
URL http://secunia.com/advisories/15854/