CVE-2019-18345

critical

Description

A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrator, the attacker can for example add a new admin user to gain full access to the application.

References

https://www.debian.org/security/2019/dsa-4582

https://www.davical.org/

https://wiki.davical.org/index.php/Main_Page

https://seclists.org/bugtraq/2019/Dec/30

https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html

https://hackdefense.com/publications/cve-2019-18345-davical-caldav-server-vulnerability/

https://gitlab.com/davical-project/davical/blob/master/ChangeLog

http://packetstormsecurity.com/files/155630/DAViCal-CalDAV-Server-1.1.8-Reflective-Cross-Site-Scripting.html

Details

Source: Mitre, NVD

Published: 2019-12-12

Updated: 2023-02-01

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Severity: Critical