CVE-2022-24838 – Command Injection in Appointment Emails for Nextcloud Calendar
https://notcve.org/view.php?id=CVE-2022-24838
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:<BOOKING USER'S EMAIL> ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available. Nextcloud Calendar es una aplicación de calendario para el framework nextcloud. • https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35 https://github.com/nextcloud/calendar/pull/4073 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2021-34812
https://notcve.org/view.php?id=CVE-2021-34812
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors. La vulnerabilidad del uso de credenciales codificadas en el componente php de Synology Calendar anterior a la versión 2.4.0-0761 permite a los atacantes remotos obtener información confidencial a través de vectores no especificados • https://www.synology.com/security/advisory/Synology_SA_21_12 • CWE-798: Use of Hard-coded Credentials •
CVE-2019-11829
https://notcve.org/view.php?id=CVE-2019-11829
OS command injection vulnerability in drivers_syno_import_user.php in Synology Calendar before 2.3.1-0617 allows remote attackers to execute arbitrary commands via the crafted 'X-Real-IP' header. Una vulnerabilidad de inyección de comandos del sistema operativo en el archivo drivers_syno_import_user.php en Synology Calendar anterior a versión 2.3.1-0617, permite a los atacantes remotos ejecutar comandos arbitrarios por medio del encabezado “X-Real-IP” creado. • https://www.synology.com/security/advisory/Synology_SA_19_12 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2019-11825
https://notcve.org/view.php?id=CVE-2019-11825
Cross-site scripting (XSS) vulnerability in Event Editor in Synology Calendar before 2.3.0-0615 allows remote attackers to inject arbitrary web script or HTML via the title parameter. Una vulnerabilidad de tipo cross-site scripting (XSS) en el Editor de eventos en Synology Calendar anterior a versión 2.3.0-0615, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro title. • https://www.synology.com/security/advisory/Synology_SA_19_04 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-11820
https://notcve.org/view.php?id=CVE-2019-11820
Information exposure through process environment vulnerability in Synology Calendar before 2.3.3-0620 allows local users to obtain credentials via cmdline. La exposición a la información a través de la vulnerabilidad del entorno de procesos en Synology Calendar, versiones anteriores a 2.3.3-0620, permite a los usuarios locales obtener credenciales a través de cmdline. • https://www.synology.com/security/advisory/Synology_SA_19_21 • CWE-522: Insufficiently Protected Credentials •