5 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Session management does not use a sufficiently hard-to-guess session key. Anyone who can guess the microsecond time (and the incrementing session_id) can impersonate a session. Se descubrió un problema en DAViCal Andrew's Web Libraries (AWL) versiones hasta el 0,60. La administración de sesiones no usa una clave de sesión lo suficientemente difícil de adivinar. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956650 https://gitlab.com/davical-project/awl/-/issues/19 https://lists.debian.org/debian-lts-announce/2020/04/msg00011.html https://usn.ubuntu.com/4539-1 https://www.debian.org/security/2020/dsa-4660 • CWE-384: Session Fixation •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Long-term session cookies, uses to provide long-term session continuity, are not generated securely, enabling a brute-force attack that may be successful. Se descubrió un problema en DAViCal Andrew's Web Libraries (AWL) versiones hasta la versión 0,60. Las cookies de sesión long-term, usadas para proveer una continuidad de sesión a largo plazo, no son generadas de manera segura, permitiendo un ataque de fuerza bruta que puede tener éxito. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956650 https://gitlab.com/davical-project/awl/-/issues/18 https://lists.debian.org/debian-lts-announce/2020/04/msg00011.html https://www.debian.org/security/2020/dsa-4660 • CWE-384: Session Fixation •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 2

A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrator, the attacker can for example add a new admin user to gain full access to the application. Se detectó un problema de tipo XSS reflejado en DAViCal versiones hasta 1.1.8. • http://packetstormsecurity.com/files/155630/DAViCal-CalDAV-Server-1.1.8-Reflective-Cross-Site-Scripting.html https://gitlab.com/davical-project/davical/blob/master/ChangeLog https://hackdefense.com/publications/cve-2019-18345-davical-caldav-server-vulnerability https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html https://seclists.org/bugtraq/2019/Dec/30 https://wiki.davical.org/index.php/Main_Page https://www.davical.org https://www.debian.org/security/2019/dsa-4582 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A stored XSS issue was discovered in DAViCal through 1.1.8. It does not adequately sanitize output of various fields that can be set by unprivileged users, making it possible for JavaScript stored in those fields to be executed by another (possibly privileged) user. Affected database fields include Username, Display Name, and Email. Se descubrió un problema de XSS almacenado en DAViCal versiones hasta la versión 1.1.8. No sanea adecuadamente la salida de varios campos que pueden ser establecidos por parte de usuarios no privilegiados, haciendo posible un JavaScript almacenado en esos campos para ser ejecutado por otro usuario (posiblemente privilegiado) . • http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/Dec/17 http://seclists.org/fulldisclosure/2019/Dec/18 http://seclists.org/fulldisclosure/2019/Dec/19 https://gitlab.com/davical-project/davical/blob/master/ChangeLog https://hackdefense.com/publications/cve-2019-18347-davical-caldav-server-vulnerability https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html https://seclists.org/bugtraq/2019& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 1

A CSRF issue was discovered in DAViCal through 1.1.8. If an authenticated user visits an attacker-controlled webpage, the attacker can send arbitrary requests in the name of the user to the application. If the attacked user is an administrator, the attacker could for example add a new admin user. Se descubrió un problema de tipo CSRF en DAViCal versiones hasta la versión 1.1.8. Si un usuario autenticado visita una página web controlada por parte del atacante, el atacante puede enviar peticiones arbitrarias en el nombre del usuario para la aplicación. • http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html http://seclists.org/fulldisclosure/2019/Dec/17 http://seclists.org/fulldisclosure/2019/Dec/18 http://seclists.org/fulldisclosure/2019/Dec/19 https://gitlab.com/davical-project/davical/blob/master/ChangeLog https://hackdefense.com/publications/cve-2019-18346-davical-caldav-server-vulnerability https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html https://seclists.org/bugtraq/2019/ • CWE-352: Cross-Site Request Forgery (CSRF) •