CVE-2023-48308 – Calendar app returns full stacktrace when an error happens while editing appointment
https://notcve.org/view.php?id=CVE-2023-48308
Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3 Nextcloud/Cloud es una aplicación de calendario para Nextcloud. Un atacante puede obtener acceso al seguimiento de pila y a las rutas internas del servidor al generar una excepción al editar una cita del calendario. Se recomienda actualizar la aplicación Calendario Nextcloud a 4.5.3 • https://github.com/nextcloud/calendar/pull/5553 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information •
CVE-2023-45150 – Inviting excessive long email addresses to a calendar event makes the Nextcloud server unresponsive
https://notcve.org/view.php?id=CVE-2023-45150
Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app. Nextcloud calendar es una aplicación de calendario para la plataforma del servidor Nextcloud. • https://github.com/nextcloud/calendar/pull/5358 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452 https://hackerone.com/reports/2058337 • CWE-354: Improper Validation of Integrity Check Value CWE-400: Uncontrolled Resource Consumption •
CVE-2023-33183 – Error in calendar when booking an appointment reveals the full path of the website
https://notcve.org/view.php?id=CVE-2023-33183
Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3 • https://github.com/nextcloud/calendar/pull/4938 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j • CWE-285: Improper Authorization •
CVE-2022-24838 – Command Injection in Appointment Emails for Nextcloud Calendar
https://notcve.org/view.php?id=CVE-2022-24838
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:<BOOKING USER'S EMAIL> ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available. Nextcloud Calendar es una aplicación de calendario para el framework nextcloud. • https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35 https://github.com/nextcloud/calendar/pull/4073 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2018-3763
https://notcve.org/view.php?id=CVE-2018-3763
In Nextcloud Calendar before 1.5.8 and 1.6.1, a missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins. En Nextcloud Calendar en versiones anteriores a la 1.5.8 y la 1.6.1, la falta de saneamiento de los resultados de búsqueda de un campo de autocompletar podría conducir a Cross-Site Scripting (XSS) persistente que requiere interacción del usuario. La falta de saneamiento solo afectó a los nombres de grupo, por lo que los resultados de búsqueda maliciosos solo podrían ser manipulados por usuarios privilegiados como los administradores o los administradores de grupo. • https://nextcloud.com/security/advisory/?id=nc-sa-2018-004 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •