davical: CVE-2019-18345 CVE-2019-18346 CVE-2019-18347

Related Vulnerabilities: CVE-2019-18345   CVE-2019-18346   CVE-2019-18347  

Debian Bug report logs - #946343
davical: CVE-2019-18345 CVE-2019-18346 CVE-2019-18347

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 7 Dec 2019 15:39:01 UTC

Severity: important

Tags: security, upstream

Found in version davical/1.1.8-1

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Davical Development Team <davical-devel@lists.sourceforge.net>:
Bug#946343; Package src:davical. (Sat, 07 Dec 2019 15:39:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Davical Development Team <davical-devel@lists.sourceforge.net>. (Sat, 07 Dec 2019 15:39:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: davical: CVE-2019-18345 CVE-2019-18346 CVE-2019-18347
Date: Sat, 07 Dec 2019 16:34:38 +0100
Source: davical
Version: 1.1.8-1
Severity: important
Tags: security upstream

Hi,

The following vulnerabilities were published for davical.

CVE-2019-18345[0]:
| Reflected Cross-Site Scripting (XSS) vulnerability

CVE-2019-18346[1]:
| A CSRF issue was discovered in DAViCal through 1.1.8. If an
| authenticated user visits an attacker-controlled webpage, the attacker
| can send arbitrary requests in the name of the user to the
| application. If the attacked user is an administrator, the attacker
| could for example add a new admin user.


CVE-2019-18347[2]:
| A stored XSS issue was discovered in DAViCal through 1.1.8. It does
| not adequately sanitize output of various fields that can be set by
| unprivileged users, making it possible for JavaScript stored in those
| fields to be executed by another (possibly privileged) user. Affected
| database fields include Username, Display Name, and Email.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-18345
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18345
[1] https://security-tracker.debian.org/tracker/CVE-2019-18346
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18346
[2] https://security-tracker.debian.org/tracker/CVE-2019-18347
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18347

Please adjust the affected versions in the BTS as needed. If affected
version do not match for all those, feel free to clone individual bugs
repsectively.

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Dec 7 20:51:56 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.