A CSRF issue was discovered in DAViCal through 1.1.8. If an authenticated user visits an attacker-controlled webpage, the attacker can send arbitrary requests in the name of the user to the application. If the attacked user is an administrator, the attacker could for example add a new admin user.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.davical.org/ | product |
https://gitlab.com/davical-project/davical/blob/master/ChangeLog | third party advisory release notes |
https://hackdefense.com/publications/cve-2019-18346-davical-caldav-server-vulnerability/ | third party advisory exploit |
http://seclists.org/fulldisclosure/2019/Dec/17 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Dec/19 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Dec/18 | third party advisory mailing list |
http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html | third party advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html | mailing list |
https://www.debian.org/security/2019/dsa-4582 | vendor advisory |
https://seclists.org/bugtraq/2019/Dec/30 | mailing list |