A stored XSS issue was discovered in DAViCal through 1.1.8. It does not adequately sanitize output of various fields that can be set by unprivileged users, making it possible for JavaScript stored in those fields to be executed by another (possibly privileged) user. Affected database fields include Username, Display Name, and Email.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.davical.org/ | product |
https://gitlab.com/davical-project/davical/blob/master/ChangeLog | third party advisory release notes |
https://hackdefense.com/publications/cve-2019-18347-davical-caldav-server-vulnerability/ | third party advisory exploit |
http://seclists.org/fulldisclosure/2019/Dec/17 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Dec/19 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Dec/18 | third party advisory mailing list |
http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html | third party advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00016.html | mailing list |
https://www.debian.org/security/2019/dsa-4582 | vendor advisory |
https://seclists.org/bugtraq/2019/Dec/30 | mailing list |