ACal version 2.2.5 is susceptible to system bypass.
a7032d684662eea5898f916e53684a1d0583490dbd527e001fa32e026c8a5a2e
New eVuln Advisory:
ACal Authentication Bypass & PHP Code Insertion
--------------------Summary----------------
Software: ACal
Sowtware's Web Site: http://acalproj.sourceforge.net/
Versions: 2.2.5
Critical Level: Dangerous
Type: PHP Code Execution
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0025
-----------------Description---------------
Vulnerabe script: login.php
To authorize any user forum scripts checks only one cookie variable: ACalAuthenticate
Forum dont make password comparison.
Registered users can modify header.php and footer.php files. System access is possible.
--------------Exploit----------------------
Cookie: ACalAuthenticate=inside
--------------Solution---------------------
No Patch available.
--------------Credit-----------------------
Original Advisory:
http://evuln.com/vulns/25/summary.html
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)